General

  • Target

    NerestPCfree.zip

  • Size

    10.3MB

  • Sample

    241214-vh914azpfk

  • MD5

    ce1cc9b7e6f2ad2ef897942565b16db7

  • SHA1

    9816b0bdf142acb7e2f92990221ec099f03b5662

  • SHA256

    ad8d4a6b44aa1d12db0966ddcf16e07942efce4e3f7303c0845864f7f18bbc91

  • SHA512

    5b8b5367a0a240e42b6c68d824ddd4376d5fff02caf5a5210c27f0127b302fc36828036fe543364af940c58dc014b70dd6d75d9292a8c16e9f87902126432f6b

  • SSDEEP

    196608:PQGmZUqD06w5KEiZcOoLcaQeEgK6Sq//l7Hl67zxQEZ84ezi8Nt7U:P34RxhEQcxLMefdSSBHqiEuviU7U

Malware Config

Targets

    • Target

      NerestPC free/NerestPCFree 0.31.1.exe

    • Size

      7.0MB

    • MD5

      9d0a77bd28d67eab798c50f0c6a24b64

    • SHA1

      2de59eddd73ab784cc8f791cd96d7f81741ccae3

    • SHA256

      a35479bc985fe56167b824f5d0d9ff96598af672afe8785bc9f87815c11393dc

    • SHA512

      25ca283707b61c8149615f7e7958edb886378702ecbcf079191698d686b4a7a39d1be655e44ccf2752e569481e9eb25f3a10e59322c0c97c7e858fb5f9eabb17

    • SSDEEP

      196608:i46iIYMaKuKGfjtVlQqtolrkiBJk3b8pA2uW3c:i7YpBDtVlmlgyJ0r

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      NerestPC free/bin/Adb.dll

    • Size

      1.3MB

    • MD5

      df6b9f63d6ca8d29fa17b6784bae7d09

    • SHA1

      a0c00f4f23c21c5b82c265445abba57970494497

    • SHA256

      f88a8d9f76febee6b09ba79600de9d11609370f3c12f275368ef17864165df0e

    • SHA512

      5fa231675b6a696b5addd31ecd37a5a50c44c355455785bc07950b5b0ce95e86a0c578baa6a996d609d64aca0e76ca8488478cdd42ef6dfddb720882b0a4712e

    • SSDEEP

      24576:YctQRhHzhITMNr+Kzsh5/Adv7/QzJDqH/IX5CWWPNJcqO1vB:YctQRhlnNrI5/AvLQzJ1RqJ

    Score
    1/10
    • Target

      NerestPC free/bin/AdbWinApi.dll

    • Size

      105KB

    • MD5

      73030f38c867f5a7bd6ee331203f3d7a

    • SHA1

      3e71b43c9b25af29bb4b8f455c176c5e89404567

    • SHA256

      9ffacedc41b2752075571e1a474ff50c5dcbe1f64db56db24aaec78aea1126df

    • SHA512

      492988fc89ae61e3af4904c0f593fbc4703293a915901ff98824cdcc77a7ac695faee8e1da56c66e3e2591216234a609841fb2393ce1dd2aeb91014952c6a297

    • SSDEEP

      1536:2wqdq+3pvspmLh8SCykrpTG7kfGHuNezq02XJqo+iFi1yCPP7r3PxUU:2wqD3L8Tezq0et+ui1y6vxr

    Score
    3/10
    • Target

      NerestPC free/bin/AdbWinUsbApi.dll

    • Size

      71KB

    • MD5

      f67d9ec28d19316754d7ecb0e990197d

    • SHA1

      a82ba3ad1a0749dd91eaac34dced3622d10dba54

    • SHA256

      13918fdab0c3ac77d077453a6036247cfeca10910aec845f188c41148c630bb2

    • SHA512

      abd80e386ce282bbb4727c7bd795d7bb0046fecfe65b005c98609f18b341606166187e951a5beacb5112726eab28bf9b75b383cb55ca9d0303b286389fd25022

    • SSDEEP

      1536:q72doFmOiHizFbPlspcsbj5ZsP+YeTs1pH7tsPxHt:qSSfN9+YeTs1pHJcxN

    Score
    3/10
    • Target

      NerestPC free/bin/adb.exe

    • Size

      5.6MB

    • MD5

      f1f479bba21298e758fc22d8d98f8e48

    • SHA1

      2f7ef0bf7a9ca33da621ba29794ae9c8c95c0bca

    • SHA256

      705ddc21f33ac52105d1b075b019962ad0e44fb3d560bde69ce8cb3a36bca183

    • SHA512

      3b491cd07e1e05e14fcec13956e8c023a4f2bbcb9459f3965868a00e33bc4d7e258ac645da9f1b5ca6f9d9a757b879d696ab95800a03240b37aa42265d4e914f

    • SSDEEP

      49152:p1bbBWmqcEr5DV0uLC5sakvVgieBn5BzPZjdZYvM+ojzJLF+vW6Daa55pXxNh9Vm:hgV5mkvt6NzZYU+iWz5iXGTailRRQd

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks