General
-
Target
Nursultan Alpha (infected).zip
-
Size
3.2MB
-
Sample
250113-e7qqraymgp
-
MD5
29108c772cf1950517ae3ddbba6e45a2
-
SHA1
170bfc975317af9394243695a2b0531142421467
-
SHA256
68ac85a4ee781274cf51cb11e59f650606507af297108bb2938bc18f3b6a5bce
-
SHA512
3bad45b603b19003641a38f16eede66ae0ca2e5a4d3212df64603069af3c86918e0f99ba91f6e02b2e9d84ca879a1c5332e2e38f60d923f4b45bdd18959f89e3
-
SSDEEP
49152:Gu3Hznre/Mu+RLcHmT7fAXEWu12+1ho6daXVd6A14JZUwma4hd/QZdkre:Gu7re7q7fsEWLKhPdaiA0G9hdNe
Static task
static1
Malware Config
Targets
-
-
Target
Nursultan Alpha.exe
-
Size
3.8MB
-
MD5
eb9f6fb7804c8c8dbd3ebb1d355fa173
-
SHA1
1a37eaa4e337486684f104578fd6bda83bbecd90
-
SHA256
8a67da8e48b02c1e2b697629fe80e2de89a8eabee46778b3d1c461a14848142d
-
SHA512
e94a0664474caa4b9a964b6cb83b9623ae2fe628b61ead3c90364e4168969884da4dd93340c96b48e49237a5b3748d4c881bcce7e299367e6a8f66408c8dded4
-
SSDEEP
98304:yX1GibnDr0kTmDBN68MiXWF21fGotJfqf+5Ybux:y1GibnkkTW68MATfGVf+5o4
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1