General
-
Target
Nursultan.exe
-
Size
1.4MB
-
Sample
240530-gma6nsgf9v
-
MD5
04dd1f99162ef231ab0c9d28d181e9d2
-
SHA1
af9cb52510704981a6e3daeae61c617d711366ef
-
SHA256
c383f1a8383c27fda0910a6691aa4a7561d86094e3309df7d2ad787d8e601086
-
SHA512
701b7557e14384648fafdc58ae28f76abee5d1c9f567884c42371e722d699d923ac6df68d0a896207452a2eeea4fe65cbcd350f11a2ff519b51b776970565614
-
SSDEEP
24576:wBmXmo2G/nvxW3Ww0tBBlxD41ittL91eboEH2IgYAUUjZhI:wBi3bA30BBlxnioE5AW
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1245420777592062054/saI81XWOLJi1mJiEEt2FK-cyIKsq2Ayc-BlexWZ-2Fj0plrNSjRsNmF63M5uf5r_C7a0
Targets
-
-
Target
Nursultan.exe
-
Size
1.4MB
-
MD5
04dd1f99162ef231ab0c9d28d181e9d2
-
SHA1
af9cb52510704981a6e3daeae61c617d711366ef
-
SHA256
c383f1a8383c27fda0910a6691aa4a7561d86094e3309df7d2ad787d8e601086
-
SHA512
701b7557e14384648fafdc58ae28f76abee5d1c9f567884c42371e722d699d923ac6df68d0a896207452a2eeea4fe65cbcd350f11a2ff519b51b776970565614
-
SSDEEP
24576:wBmXmo2G/nvxW3Ww0tBBlxD41ittL91eboEH2IgYAUUjZhI:wBi3bA30BBlxnioE5AW
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-