General

  • Target

    Nursultan Alpha (infected).zip

  • Size

    3.2MB

  • Sample

    250113-e7qqraymgp

  • MD5

    29108c772cf1950517ae3ddbba6e45a2

  • SHA1

    170bfc975317af9394243695a2b0531142421467

  • SHA256

    68ac85a4ee781274cf51cb11e59f650606507af297108bb2938bc18f3b6a5bce

  • SHA512

    3bad45b603b19003641a38f16eede66ae0ca2e5a4d3212df64603069af3c86918e0f99ba91f6e02b2e9d84ca879a1c5332e2e38f60d923f4b45bdd18959f89e3

  • SSDEEP

    49152:Gu3Hznre/Mu+RLcHmT7fAXEWu12+1ho6daXVd6A14JZUwma4hd/QZdkre:Gu7re7q7fsEWLKhPdaiA0G9hdNe

Malware Config

Targets

    • Target

      Nursultan Alpha.exe

    • Size

      3.8MB

    • MD5

      eb9f6fb7804c8c8dbd3ebb1d355fa173

    • SHA1

      1a37eaa4e337486684f104578fd6bda83bbecd90

    • SHA256

      8a67da8e48b02c1e2b697629fe80e2de89a8eabee46778b3d1c461a14848142d

    • SHA512

      e94a0664474caa4b9a964b6cb83b9623ae2fe628b61ead3c90364e4168969884da4dd93340c96b48e49237a5b3748d4c881bcce7e299367e6a8f66408c8dded4

    • SSDEEP

      98304:yX1GibnDr0kTmDBN68MiXWF21fGotJfqf+5Ybux:y1GibnkkTW68MATfGVf+5o4

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks