General

  • Target

    New Client.exe

  • Size

    167KB

  • Sample

    241222-a2qfkswpcl

  • MD5

    774fff2810fc115bab05707f73047457

  • SHA1

    6dbf565150aa9a791e0f9f345243984ec6f5fa5a

  • SHA256

    11478265d9ce8d9c390a3c28960972d1c4fa3e1a532183d7ea7e3cdd039f688d

  • SHA512

    dc5a9dd495b912f386b668c95622addce7ebb7fa23a93ffec144c2766695c94a4c00534e567d3a153009987e3fe2683d9715d058a677a20ce498dfcc2276c96a

  • SSDEEP

    3072:pVMADoN36tnQviFCtABnKfWl9zmaF9byYvMJUJ8T2SXZyrgoBJtbN/3MCK2kevEz:pui9z9vM1/JdSI5eb

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

HacKed

C2

127.0.0.1:14324

Mutex

discord.exe

Attributes
  • reg_key

    discord.exe

  • splitter

    |Ghost|

Targets

    • Target

      New Client.exe

    • Size

      167KB

    • MD5

      774fff2810fc115bab05707f73047457

    • SHA1

      6dbf565150aa9a791e0f9f345243984ec6f5fa5a

    • SHA256

      11478265d9ce8d9c390a3c28960972d1c4fa3e1a532183d7ea7e3cdd039f688d

    • SHA512

      dc5a9dd495b912f386b668c95622addce7ebb7fa23a93ffec144c2766695c94a4c00534e567d3a153009987e3fe2683d9715d058a677a20ce498dfcc2276c96a

    • SSDEEP

      3072:pVMADoN36tnQviFCtABnKfWl9zmaF9byYvMJUJ8T2SXZyrgoBJtbN/3MCK2kevEz:pui9z9vM1/JdSI5eb

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks