Resubmissions

25-11-2024 10:00

241125-l129jaxlhr 10

25-11-2024 09:58

241125-lzk9ma1kg1 10

25-11-2024 09:56

241125-lyt55s1kew 10

25-11-2024 09:46

241125-lrsnqswral 10

General

  • Target

    EXECUTOR METEOR .bat

  • Size

    1.1MB

  • Sample

    241125-l129jaxlhr

  • MD5

    e5be94d6e847bb7656e80201cacf67fb

  • SHA1

    cc1ce69eea609b5fc9ff18f09407b934690bcff3

  • SHA256

    be5c49fa94be78520ee83ed6230a80aaf0ae9dd4bb2d6053aa8f843131f2f506

  • SHA512

    306c26f1e72a32c479b8d9112e2e0c5d22fd0e46b02ae5fa7ffff51191c9d79a52a2dbe7d200e0dc9cccf0919cba3693905c8b2dc6c6fc8f3d7eaf883e388100

  • SSDEEP

    24576:U2G/nvxW3Ww0tiUfTyqyg1hIZ9XWp7wJO:UbA30L+ixx

Malware Config

Targets

    • Target

      EXECUTOR METEOR .bat

    • Size

      1.1MB

    • MD5

      e5be94d6e847bb7656e80201cacf67fb

    • SHA1

      cc1ce69eea609b5fc9ff18f09407b934690bcff3

    • SHA256

      be5c49fa94be78520ee83ed6230a80aaf0ae9dd4bb2d6053aa8f843131f2f506

    • SHA512

      306c26f1e72a32c479b8d9112e2e0c5d22fd0e46b02ae5fa7ffff51191c9d79a52a2dbe7d200e0dc9cccf0919cba3693905c8b2dc6c6fc8f3d7eaf883e388100

    • SSDEEP

      24576:U2G/nvxW3Ww0tiUfTyqyg1hIZ9XWp7wJO:UbA30L+ixx

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks