General

  • Target

    3854c9ebd49d0c236145f2311fa56bfa5798d227bc73538fc535a9fd3f496e4c

  • Size

    4.9MB

  • Sample

    241109-z437ws1qbs

  • MD5

    3da200a28718a69db8ab79214990ad7c

  • SHA1

    b6ed723d194b8ac4b038a79ee1250881695de651

  • SHA256

    3854c9ebd49d0c236145f2311fa56bfa5798d227bc73538fc535a9fd3f496e4c

  • SHA512

    536f668c2c1d006cc5053162d4d10ffd1d7af5728fc7c019c579ce002ebd5e10d3e7232cae85579bcb2078d30e2d0ae53ebf25115a69f42a718b011952c9d71e

  • SSDEEP

    49152:bl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

rc4.plain

Targets

    • Target

      3854c9ebd49d0c236145f2311fa56bfa5798d227bc73538fc535a9fd3f496e4c

    • Size

      4.9MB

    • MD5

      3da200a28718a69db8ab79214990ad7c

    • SHA1

      b6ed723d194b8ac4b038a79ee1250881695de651

    • SHA256

      3854c9ebd49d0c236145f2311fa56bfa5798d227bc73538fc535a9fd3f496e4c

    • SHA512

      536f668c2c1d006cc5053162d4d10ffd1d7af5728fc7c019c579ce002ebd5e10d3e7232cae85579bcb2078d30e2d0ae53ebf25115a69f42a718b011952c9d71e

    • SSDEEP

      49152:bl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

    • Colibri Loader

      A loader sold as MaaS first seen in August 2021.

    • Colibri family

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks