Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    bf937d79c4f60f8c681296528af7bc7b04e4507d33f0802eed126a9f4df95e82.exe

  • Size

    4.9MB

  • Sample

    241114-l6s8taxfjf

  • MD5

    25182c721a9a0f64e4ed7c31e1c8c6bc

  • SHA1

    50c80cd3ed583b2fb9d6c47d4e2318d8e1d5c584

  • SHA256

    bf937d79c4f60f8c681296528af7bc7b04e4507d33f0802eed126a9f4df95e82

  • SHA512

    57f16d2455ea10205deb379ee0f8892037cd7239f05e504794b22a105f9a6bd997a1618626ea2965c8405548d28f8173a5f4ed606b2760708a6bcd0348d88565

  • SSDEEP

    49152:Ll5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8/:n

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

rc4.plain
1
hf9qkeO66MP7WJXkg9rp

Targets

    • Target

      bf937d79c4f60f8c681296528af7bc7b04e4507d33f0802eed126a9f4df95e82.exe

    • Size

      4.9MB

    • MD5

      25182c721a9a0f64e4ed7c31e1c8c6bc

    • SHA1

      50c80cd3ed583b2fb9d6c47d4e2318d8e1d5c584

    • SHA256

      bf937d79c4f60f8c681296528af7bc7b04e4507d33f0802eed126a9f4df95e82

    • SHA512

      57f16d2455ea10205deb379ee0f8892037cd7239f05e504794b22a105f9a6bd997a1618626ea2965c8405548d28f8173a5f4ed606b2760708a6bcd0348d88565

    • SSDEEP

      49152:Ll5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8/:n

    • Colibri Loader

      A loader sold as MaaS first seen in August 2021.

    • Colibri family

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.