General

  • Target

    neverlose 3.exe

  • Size

    3.0MB

  • Sample

    241204-mpd81ayjbr

  • MD5

    d85cbe8df31057755dcfb1276acbeb55

  • SHA1

    dc054ac21d8f7beae6e9c439f5e5923730d14b94

  • SHA256

    f60844ef3d886a602137c29b0a7f994494b3d4276d7373ee3ab138a4ccff3d58

  • SHA512

    e075cfcf01eca07e9cb5963be06afd79e42a53d22dd7837858e56beb301101bf03b61d0bcddb00d3442855edad94807a0afee0acf5e165a6678cecf19f9ea99e

  • SSDEEP

    49152:RbA3jHZLMGaxfSIkbO+7+KrktBibbg8LU7x/5uzMkXil:Rb4Z4Bxqg4rkvibb1Yt5u1Sl

Malware Config

Targets

    • Target

      neverlose 3.exe

    • Size

      3.0MB

    • MD5

      d85cbe8df31057755dcfb1276acbeb55

    • SHA1

      dc054ac21d8f7beae6e9c439f5e5923730d14b94

    • SHA256

      f60844ef3d886a602137c29b0a7f994494b3d4276d7373ee3ab138a4ccff3d58

    • SHA512

      e075cfcf01eca07e9cb5963be06afd79e42a53d22dd7837858e56beb301101bf03b61d0bcddb00d3442855edad94807a0afee0acf5e165a6678cecf19f9ea99e

    • SSDEEP

      49152:RbA3jHZLMGaxfSIkbO+7+KrktBibbg8LU7x/5uzMkXil:Rb4Z4Bxqg4rkvibb1Yt5u1Sl

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks