General

  • Target

    SupremeVipp.rar

  • Size

    543KB

  • Sample

    241219-y3ra9symbt

  • MD5

    b33c0ebbd925de9fd90fe0b57e3db847

  • SHA1

    8067c448a8dbf3dc4bfa985c0113bec2760a42f6

  • SHA256

    e929ffde8ba0fa4b8d5faec6f239a3d6be796743f46818cd8b999fd709ff01d5

  • SHA512

    1696ca229f1ce1db728d4ea20cd425e7724b2408639beb0d86809d956405a11206065daee1e05d14e126361c2d211d08c099021dcfb559bdc901aca1505c9820

  • SSDEEP

    12288:ljKnCZFia//vTGnJjWMzAkwhQ83rNtWs7HYTBkwDS/Zxj7pdE:ljW8///vk9vuz3rNtWsTekwDS/r7bE

Malware Config

Targets

    • Target

      SupremeVipp.exe

    • Size

      1.1MB

    • MD5

      80f8617bfd30728890f53eb862d61199

    • SHA1

      27ea5c74d941906a55a76e54c84af2694e293961

    • SHA256

      6fdf3c1c4d3c20cdd19d665cb4aec0881aad3b76376dad0c46b80548c56c2144

    • SHA512

      0cdd9dea34b6bc9449d3614faf89e12c9a4b5fcbcde1bcac8805788b98e4bbc772b4a23e0a662e3b05c4bb80bb57b534d7a8e475de9142a5bc56c4faa45a8ff7

    • SSDEEP

      24576:U2G/nvxW3Ww0tUlth5yjwIHYWiCBpX7mYOyTexZ6km:UbA30uhqvW76L

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks