General

  • Target

    PZCheat.rar

  • Size

    1.3MB

  • Sample

    230202-dnnxdagd5s

  • MD5

    8b862540a3b2b61ac121451f21ec5a31

  • SHA1

    b7cdf45ad54554ab5f425c609818e89491d3d45f

  • SHA256

    941f69dfaf5589ff59a8e9e2958af2ebad874806e533f74a47982c9491c26e2c

  • SHA512

    5991e3a3b945bbcb0b63bf06373c864f4aa68305899d2d6585808d1cd81c9cc91286d73aba2515e51c89850f829260a29ba5949a629eeaadb3949d3eeec8c2cc

  • SSDEEP

    24576:YiwvPYQ7qgTMjlBX6VgM5buUxBug8ffXHITgONuEdsIUJyXbFdMTVU:QvPn7qYMD6V3bup5XHIcOUEehupdMW

Score
10/10

Malware Config

Targets

    • Target

      PZCheat.exe

    • Size

      1.5MB

    • MD5

      164ba5ee6f6b30539e874248ccfa4c05

    • SHA1

      6b14ed8dab712359453779f2896e1cbad78871d7

    • SHA256

      fc7ca5dbd9e3d228416ea9725c7283d105d75533f7a4e069d89f2632840e1a5d

    • SHA512

      c9b2eef0e4499832f9c4eca8b503f17f4cc7589d0d2b12fe82572ad5df23e85cef9267bdc24928b7ac6df0fff70fe49d2422d6e9a549f07a74c8f9bd47892cfc

    • SSDEEP

      24576:B2G/nvxW3WLRnhzLfSRyBWkNUk9tJIzxIq2+kt3S5wFAiQuwV4ilByjNTVu1:BbA3+p9SRyBW0Tty2E5wFzQuo4iupRu1

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks