General

  • Target

    00e3864ad7925c7c7e234e0e5e4ca8a7ab1cf9dd3ba2ca88d8d86c225bd376fdN

  • Size

    4.9MB

  • Sample

    241020-bnyepsscqk

  • MD5

    07745c15749e227743b3a3c33f615ec0

  • SHA1

    b2c4d5a541e26725a9d04c0b538f253834b1770c

  • SHA256

    00e3864ad7925c7c7e234e0e5e4ca8a7ab1cf9dd3ba2ca88d8d86c225bd376fd

  • SHA512

    34d71d6919df3b932e44dd8bea60704973519982bb3f1b57d7edcbf2bf52824213e10b2b6238b9d40ea81295ef35dbb2050e908916c23fffb90852303dcc1c0f

  • SSDEEP

    49152:Dl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

rc4.plain

Targets

    • Target

      00e3864ad7925c7c7e234e0e5e4ca8a7ab1cf9dd3ba2ca88d8d86c225bd376fdN

    • Size

      4.9MB

    • MD5

      07745c15749e227743b3a3c33f615ec0

    • SHA1

      b2c4d5a541e26725a9d04c0b538f253834b1770c

    • SHA256

      00e3864ad7925c7c7e234e0e5e4ca8a7ab1cf9dd3ba2ca88d8d86c225bd376fd

    • SHA512

      34d71d6919df3b932e44dd8bea60704973519982bb3f1b57d7edcbf2bf52824213e10b2b6238b9d40ea81295ef35dbb2050e908916c23fffb90852303dcc1c0f

    • SSDEEP

      49152:Dl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

    • Colibri Loader

      A loader sold as MaaS first seen in August 2021.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks