Resubmissions

04-12-2024 10:05

241204-l4my1sxmgn 10

04-12-2024 10:02

241204-l2r5ysxmck 10

General

  • Target

    Neverlose.rar

  • Size

    2.0MB

  • Sample

    241204-l2r5ysxmck

  • MD5

    722db6635fa7aafd05fab9000272d49b

  • SHA1

    b9ecc26a64d76f672f44d4d39fe31871786ad590

  • SHA256

    19348fd43d70e3dd8effb8431e75f566ec33875889e7a4bacf08535b6667b259

  • SHA512

    f90bcbfa5d34303bde2b84b95b0af5a22ca64a02c8e05c05ff1f5a85f8a5927858b07d9ca039e5e14b5141d5bf2988711ffd37da776f242449961c2bde636b1e

  • SSDEEP

    49152:mnhi9eCBG1sfAO7cD9counMZguk1zXQ4zdKvDnd5NEoQQxFRls:mA9CDmIRIA4z2DnLeoQQzc

Malware Config

Targets

    • Target

      Neverlose.exe

    • Size

      2.6MB

    • MD5

      1924cb0ae8b7ccca9e8030087ecc5a94

    • SHA1

      a1f4565cb089b27fd3deacd0fd93733f8f0f4c32

    • SHA256

      ffc00ef9763576969540d6f2d16a929bad4c3ffc9f4e97cf60206f56a2a7718d

    • SHA512

      46ac86ae174c77cd3c81a63a6bce589260a4412d29d4704caa8bc4a064d62859f37fdfb2f5dea48e3c415c5db074f964af732c34b0e2e2ea56db6505124d33ad

    • SSDEEP

      49152:ubA3jHZLMGaxfSIkbO+7+KrktBibbg8LU7x/5uzMk+:ub4Z4Bxqg4rkvibb1Yt5u1+

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks