General

  • Target

    9ba479faf2a47f52c24c99d8a891ceb0_NEIKI

  • Size

    1.8MB

  • Sample

    240508-3jn41sdg2s

  • MD5

    9ba479faf2a47f52c24c99d8a891ceb0

  • SHA1

    d7be7085197cffb4b1690154dae9ff316234cc11

  • SHA256

    aaa2efc7a62c05bf02e552acc63fa28b792a64af9e80466ae43818a1893ba973

  • SHA512

    dc9021a4954d532697174dcb9a3406757c03dc82dbe2e448ca745cd45ac4c2a649a84455c0a766cfb1fb1cb992ce35469e093bf14156beb607f8a815048bb726

  • SSDEEP

    49152:uhjAJVllHZrhbBruPk+xjSMX4ODTDF8OcFSkMh:ugVTVXYNX9mOWSkM

Malware Config

Targets

    • Target

      9ba479faf2a47f52c24c99d8a891ceb0_NEIKI

    • Size

      1.8MB

    • MD5

      9ba479faf2a47f52c24c99d8a891ceb0

    • SHA1

      d7be7085197cffb4b1690154dae9ff316234cc11

    • SHA256

      aaa2efc7a62c05bf02e552acc63fa28b792a64af9e80466ae43818a1893ba973

    • SHA512

      dc9021a4954d532697174dcb9a3406757c03dc82dbe2e448ca745cd45ac4c2a649a84455c0a766cfb1fb1cb992ce35469e093bf14156beb607f8a815048bb726

    • SSDEEP

      49152:uhjAJVllHZrhbBruPk+xjSMX4ODTDF8OcFSkMh:ugVTVXYNX9mOWSkM

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks