Resubmissions

12-02-2023 06:08

230212-gwaw9shf55 10

02-02-2023 03:07

230202-dmra4see74 10

General

  • Target

    PZCheat.exe

  • Size

    1.5MB

  • Sample

    230212-gwaw9shf55

  • MD5

    164ba5ee6f6b30539e874248ccfa4c05

  • SHA1

    6b14ed8dab712359453779f2896e1cbad78871d7

  • SHA256

    fc7ca5dbd9e3d228416ea9725c7283d105d75533f7a4e069d89f2632840e1a5d

  • SHA512

    c9b2eef0e4499832f9c4eca8b503f17f4cc7589d0d2b12fe82572ad5df23e85cef9267bdc24928b7ac6df0fff70fe49d2422d6e9a549f07a74c8f9bd47892cfc

  • SSDEEP

    24576:B2G/nvxW3WLRnhzLfSRyBWkNUk9tJIzxIq2+kt3S5wFAiQuwV4ilByjNTVu1:BbA3+p9SRyBW0Tty2E5wFzQuo4iupRu1

Score
10/10

Malware Config

Targets

    • Target

      PZCheat.exe

    • Size

      1.5MB

    • MD5

      164ba5ee6f6b30539e874248ccfa4c05

    • SHA1

      6b14ed8dab712359453779f2896e1cbad78871d7

    • SHA256

      fc7ca5dbd9e3d228416ea9725c7283d105d75533f7a4e069d89f2632840e1a5d

    • SHA512

      c9b2eef0e4499832f9c4eca8b503f17f4cc7589d0d2b12fe82572ad5df23e85cef9267bdc24928b7ac6df0fff70fe49d2422d6e9a549f07a74c8f9bd47892cfc

    • SSDEEP

      24576:B2G/nvxW3WLRnhzLfSRyBWkNUk9tJIzxIq2+kt3S5wFAiQuwV4ilByjNTVu1:BbA3+p9SRyBW0Tty2E5wFzQuo4iupRu1

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks