General
-
Target
Solara NEW.exe
-
Size
6.9MB
-
Sample
241020-s3wcbswape
-
MD5
23afefaf5360cd0ece4cb0d5f9f59088
-
SHA1
09464062917ac2af3bcd8d8d669a9b324b2c88db
-
SHA256
0d1f2e73c09d687276067a433262e1f8dc6a1e2ac64d06bd1f6f9c6f2d559247
-
SHA512
de4b9b161935b118493cbb8c1bdaf77bdd83de9f2993f5000462ee367ed6a260b3bedee033278a1f0db85535ee1df112ee26d11c8b45f9fc1c2e6d5c64ba2357
-
SSDEEP
98304:frWORYn3zDs9FD9Br8/ja/9PdnFBVXnnG0+zHVRgMmVzuIMlHK04PBgTKZ9r/hak:qPDivr8uRVZnAH/xmVzdMleuTQpwEqvE
Static task
static1
Malware Config
Extracted
remcos
1.7 Pro
Host
HexLogin-25386.portmap.host:25386
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
SFX.exe
-
copy_folder
WinSFX
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
logs
-
keylog_path
%UserProfile%
-
mouse_option
true
-
mutex
remcos_drwamwuxqf
-
screenshot_crypt
false
-
screenshot_flag
true
-
screenshot_folder
Screens
-
screenshot_path
%SystemDrive%
-
screenshot_time
120
-
startup_value
WinSFX
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
Solara NEW.exe
-
Size
6.9MB
-
MD5
23afefaf5360cd0ece4cb0d5f9f59088
-
SHA1
09464062917ac2af3bcd8d8d669a9b324b2c88db
-
SHA256
0d1f2e73c09d687276067a433262e1f8dc6a1e2ac64d06bd1f6f9c6f2d559247
-
SHA512
de4b9b161935b118493cbb8c1bdaf77bdd83de9f2993f5000462ee367ed6a260b3bedee033278a1f0db85535ee1df112ee26d11c8b45f9fc1c2e6d5c64ba2357
-
SSDEEP
98304:frWORYn3zDs9FD9Br8/ja/9PdnFBVXnnG0+zHVRgMmVzuIMlHK04PBgTKZ9r/hak:qPDivr8uRVZnAH/xmVzdMleuTQpwEqvE
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Adds policy Run key to start application
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
6Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
7Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1