General

  • Target

    nixware (1111).zip

  • Size

    1.6MB

  • Sample

    250121-azl1daxmez

  • MD5

    1eb3f5ee72463b30e05d4c012b3904b4

  • SHA1

    6a547655ed73a92aa31012215c0f321efb5b7efd

  • SHA256

    4575b7b370f08a7a93c394c149d5e3a543befca7e88a69eb47ad21cf34dbba63

  • SHA512

    acccb5595509f35bd02cbe59c7b9d7ff07bb935d1ec795f83f81a16c4ec6d2634b5796de71e4a30d4669a976d99bc46deb9da4b63297e2878e3b0cdb7a9bb181

  • SSDEEP

    49152:P+KdvNJ2at5bTc1x1DrKHFijS0QBDrXcs/wm:Gq2P9PmPhYm

Malware Config

Targets

    • Target

      nixware.bat

    • Size

      31.6MB

    • MD5

      d0781ada3269f987c794530ff0506cd7

    • SHA1

      adf41b03527fa9689951f17f0ae78f9de857a294

    • SHA256

      f33a361478ccaf4357b7b8eb2ba785669cff5c22325de0287430e75d5a8826c8

    • SHA512

      f86e0a0fa7c9979b73dbb74611704a29e7e585a2b23ef64ac268ad19b6d1dd446b1d822384ff1a24d1dd4de48da3b5d2952c7e80dcc2072d29e12fcd7103faa1

    • SSDEEP

      24576:wTbBv5rUWed4A4kaY+Rv9HpWYAzA3K0UYGDRMo4I+J6UPoy5CTEjroZKpazt1tff:iBNpApOVz5CTEjroZm47SFdVDHNhsZ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks