General
-
Target
5779722125.exe
-
Size
5.7MB
-
Sample
230412-paa9xade8y
-
MD5
44e4646b76a889c2115bdacc6e63ba2a
-
SHA1
efe7c1dae715922ff19121ff4f0e97ca904ee536
-
SHA256
91169afa1085d0402983787772694f1e19f08f62c636683cf73e30cc9299bee8
-
SHA512
b4fc6250eb1b250e78571ecab8b301adcbb5f25a4faf42842f95bf8f73c8a3ba5ac2f64190e7f450a738aff4d495816ab9c7b4c894ff04db5754b5561c60717d
-
SSDEEP
1536:gpyA0Sdf7CwS+1iSpyOVvBkHA/BGGG/DoFVuZB3ZnMALr/pQZw3MIeqVz1iU80hy:gQcYyOx2TsuVxt11oPvZBhYU2
Static task
static1
Behavioral task
behavioral1
Sample
5779722125.exe
Resource
win7-20230220-en
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Targets
-
-
Target
5779722125.exe
-
Size
5.7MB
-
MD5
44e4646b76a889c2115bdacc6e63ba2a
-
SHA1
efe7c1dae715922ff19121ff4f0e97ca904ee536
-
SHA256
91169afa1085d0402983787772694f1e19f08f62c636683cf73e30cc9299bee8
-
SHA512
b4fc6250eb1b250e78571ecab8b301adcbb5f25a4faf42842f95bf8f73c8a3ba5ac2f64190e7f450a738aff4d495816ab9c7b4c894ff04db5754b5561c60717d
-
SSDEEP
1536:gpyA0Sdf7CwS+1iSpyOVvBkHA/BGGG/DoFVuZB3ZnMALr/pQZw3MIeqVz1iU80hy:gQcYyOx2TsuVxt11oPvZBhYU2
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-