General

  • Target

    ChatGPT-4 Online.exe

  • Size

    10.3MB

  • Sample

    231012-smrn7saa84

  • MD5

    5bdee4449def0764fc7effca6e27fc7f

  • SHA1

    fca7725197376c8b07366865c5036bdb6d642a0e

  • SHA256

    4503a708cf6f8c530c5116dd55e7d5c2dbe7e45f01d4fbb822b67bab5fb9a9cd

  • SHA512

    06bff646790111b9a5a26b287bc7210a298b3cbfa795e53486891015d4de705e62c176c75111fee51a00a7fd415a4a53930e4dd56eba63811653da72359f8c13

  • SSDEEP

    196608:5UXybWhzsudSsNkSSVcWr4k8WtdzXO7w3kfZt4V06gHgMex1jJ:6XPSGkTUk8WLzXOsUfzrA9v

Malware Config

Targets

    • Target

      ChatGPT-4 Online.exe

    • Size

      10.3MB

    • MD5

      5bdee4449def0764fc7effca6e27fc7f

    • SHA1

      fca7725197376c8b07366865c5036bdb6d642a0e

    • SHA256

      4503a708cf6f8c530c5116dd55e7d5c2dbe7e45f01d4fbb822b67bab5fb9a9cd

    • SHA512

      06bff646790111b9a5a26b287bc7210a298b3cbfa795e53486891015d4de705e62c176c75111fee51a00a7fd415a4a53930e4dd56eba63811653da72359f8c13

    • SSDEEP

      196608:5UXybWhzsudSsNkSSVcWr4k8WtdzXO7w3kfZt4V06gHgMex1jJ:6XPSGkTUk8WLzXOsUfzrA9v

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks