General

  • Target

    ca2f91b5d5d54a3fb916249210e53552b78ec7f4ffdce9be81884be15bef2847

  • Size

    4.9MB

  • Sample

    241120-eatfdavmfp

  • MD5

    4e3ae6b4f8ea1c5d2fb3a8bc008e2fff

  • SHA1

    22329e6ce220cce52f7dde6e03c082d31f27bbae

  • SHA256

    ca2f91b5d5d54a3fb916249210e53552b78ec7f4ffdce9be81884be15bef2847

  • SHA512

    6394d0a6883e478bf7f196ef1c829ff7d579ebfde1ddbdd5c59a57eb40ba82c5c15f41f71bfa4f31227198c8d722c5872c0aa01d5e750dd19523a8237db5b655

  • SSDEEP

    49152:Ll5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

rc4.plain
1
hf9qkeO66MP7WJXkg9rp

Targets

    • Target

      ca2f91b5d5d54a3fb916249210e53552b78ec7f4ffdce9be81884be15bef2847

    • Size

      4.9MB

    • MD5

      4e3ae6b4f8ea1c5d2fb3a8bc008e2fff

    • SHA1

      22329e6ce220cce52f7dde6e03c082d31f27bbae

    • SHA256

      ca2f91b5d5d54a3fb916249210e53552b78ec7f4ffdce9be81884be15bef2847

    • SHA512

      6394d0a6883e478bf7f196ef1c829ff7d579ebfde1ddbdd5c59a57eb40ba82c5c15f41f71bfa4f31227198c8d722c5872c0aa01d5e750dd19523a8237db5b655

    • SSDEEP

      49152:Ll5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

    • Colibri Loader

      A loader sold as MaaS first seen in August 2021.

    • Colibri family

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.