General

  • Target

    NerestPC free.zip

  • Size

    10.3MB

  • Sample

    241214-vg2nbszpdk

  • MD5

    ce1cc9b7e6f2ad2ef897942565b16db7

  • SHA1

    9816b0bdf142acb7e2f92990221ec099f03b5662

  • SHA256

    ad8d4a6b44aa1d12db0966ddcf16e07942efce4e3f7303c0845864f7f18bbc91

  • SHA512

    5b8b5367a0a240e42b6c68d824ddd4376d5fff02caf5a5210c27f0127b302fc36828036fe543364af940c58dc014b70dd6d75d9292a8c16e9f87902126432f6b

  • SSDEEP

    196608:PQGmZUqD06w5KEiZcOoLcaQeEgK6Sq//l7Hl67zxQEZ84ezi8Nt7U:P34RxhEQcxLMefdSSBHqiEuviU7U

Malware Config

Targets

    • Target

      NerestPC free/NerestPCFree 0.31.1.exe

    • Size

      7.0MB

    • MD5

      9d0a77bd28d67eab798c50f0c6a24b64

    • SHA1

      2de59eddd73ab784cc8f791cd96d7f81741ccae3

    • SHA256

      a35479bc985fe56167b824f5d0d9ff96598af672afe8785bc9f87815c11393dc

    • SHA512

      25ca283707b61c8149615f7e7958edb886378702ecbcf079191698d686b4a7a39d1be655e44ccf2752e569481e9eb25f3a10e59322c0c97c7e858fb5f9eabb17

    • SSDEEP

      196608:i46iIYMaKuKGfjtVlQqtolrkiBJk3b8pA2uW3c:i7YpBDtVlmlgyJ0r

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks