General

  • Target

    cf7d433c32279d2756c1e3a67e86b100_NeikiAnalytics

  • Size

    2.0MB

  • Sample

    240515-nd9q7seg6x

  • MD5

    cf7d433c32279d2756c1e3a67e86b100

  • SHA1

    3fa407d870f47bc0566c98519d29229bfad39353

  • SHA256

    dbadac74214c5322f8d6f4766163e43212c9d1085dfa9a2139f59ff01c87867b

  • SHA512

    365336fcb9b9f04f284071caeaadc5deb90be118ec837a957a9d9dcae7570d95430379c24bb8d2edf2ce783b2722bf3129da81c292a3b33692e3f28749e204b3

  • SSDEEP

    24576:0n2XTCHM4xT9V3XzsHhVmatCELYIXVelAtgbHHd:iaTUv0jmtEttc

Malware Config

Targets

    • Target

      cf7d433c32279d2756c1e3a67e86b100_NeikiAnalytics

    • Size

      2.0MB

    • MD5

      cf7d433c32279d2756c1e3a67e86b100

    • SHA1

      3fa407d870f47bc0566c98519d29229bfad39353

    • SHA256

      dbadac74214c5322f8d6f4766163e43212c9d1085dfa9a2139f59ff01c87867b

    • SHA512

      365336fcb9b9f04f284071caeaadc5deb90be118ec837a957a9d9dcae7570d95430379c24bb8d2edf2ce783b2722bf3129da81c292a3b33692e3f28749e204b3

    • SSDEEP

      24576:0n2XTCHM4xT9V3XzsHhVmatCELYIXVelAtgbHHd:iaTUv0jmtEttc

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks