General
-
Target
551102af60c05577e72365aa652e0febf1f910a1cbc097bf944eeab91e7a8bac
-
Size
4.9MB
-
Sample
241019-z5n5cszbje
-
MD5
97c2fd4f94bc323b64fa0786677e52b8
-
SHA1
4d0616246b8cd3ac2938e0c01fc3c068fb3251f7
-
SHA256
551102af60c05577e72365aa652e0febf1f910a1cbc097bf944eeab91e7a8bac
-
SHA512
785b62a23620b693bd9cdd5392fa9c7b9f979119745418b60b6944b9084f4d830cb1771d1e6abe2b941091cc994eab850b771a92cdd3904472637e0d96fd1eb9
-
SSDEEP
49152:Dl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
Static task
static1
Behavioral task
behavioral1
Sample
551102af60c05577e72365aa652e0febf1f910a1cbc097bf944eeab91e7a8bac.exe
Resource
win7-20241010-en
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Targets
-
-
Target
551102af60c05577e72365aa652e0febf1f910a1cbc097bf944eeab91e7a8bac
-
Size
4.9MB
-
MD5
97c2fd4f94bc323b64fa0786677e52b8
-
SHA1
4d0616246b8cd3ac2938e0c01fc3c068fb3251f7
-
SHA256
551102af60c05577e72365aa652e0febf1f910a1cbc097bf944eeab91e7a8bac
-
SHA512
785b62a23620b693bd9cdd5392fa9c7b9f979119745418b60b6944b9084f4d830cb1771d1e6abe2b941091cc994eab850b771a92cdd3904472637e0d96fd1eb9
-
SSDEEP
49152:Dl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2