General

  • Target

    DCRatBuild8.exe

  • Size

    2.4MB

  • Sample

    230823-sd4x6sda24

  • MD5

    6d6d0d8735a51e18174a1bae2d09115c

  • SHA1

    62f0dea7509ef394724a3572d17136f66901ed0c

  • SHA256

    578ad54194b7c74d3c07f5f7cc2ce27e77cc2d1224a09922e04ef06fc3a295d9

  • SHA512

    823895e108a4c75d5e5cc24e322376706234d99e4087874f5ac3893e01e528db328738ec7f5813006f1b27f2851b1a5c650e6c53a9b008ec362187a52fa74a32

  • SSDEEP

    49152:ZkXpq9DaJuklVRUCjk/fdpG/97v8Ij+GoHvvIzhxRnRJ:SX49DakkJ/gXfGhv9aGo6xxj

Malware Config

Extracted

Family

redline

Botnet

Pizdun

C2

94.142.138.219:20936

Attributes
  • auth_value

    20a1f7fe6575c6613ee7cc5d3025af70

Targets

    • Target

      DCRatBuild8.exe

    • Size

      2.4MB

    • MD5

      6d6d0d8735a51e18174a1bae2d09115c

    • SHA1

      62f0dea7509ef394724a3572d17136f66901ed0c

    • SHA256

      578ad54194b7c74d3c07f5f7cc2ce27e77cc2d1224a09922e04ef06fc3a295d9

    • SHA512

      823895e108a4c75d5e5cc24e322376706234d99e4087874f5ac3893e01e528db328738ec7f5813006f1b27f2851b1a5c650e6c53a9b008ec362187a52fa74a32

    • SSDEEP

      49152:ZkXpq9DaJuklVRUCjk/fdpG/97v8Ij+GoHvvIzhxRnRJ:SX49DakkJ/gXfGhv9aGo6xxj

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks