General

  • Target

    CrackNursultan2.exe

  • Size

    2.1MB

  • Sample

    250123-spht3svpcr

  • MD5

    e9b8ce25037c26fe63171b24f06d04ec

  • SHA1

    e33459bc02a1cd4824bb9f44c89b05dce7e20cec

  • SHA256

    e7706dd5f9b91a20bc5881f9efd75af166942828a426879343df9454f767ece9

  • SHA512

    ace3e8a023c6247b4e52cd09560c7c7f45af357dcaa14f26452741cddb2d09d94816b0e6bc79edefb03aa6e169385f0dfd039feba0e781a0e0884a3859100ef4

  • SSDEEP

    24576:2TbBv5rUyXVs/ZFmQyOMPaRILC9j5oaKACNnAuuyGf2YnSeqjEwJdAXf0YaHssOq:IBJ8zAE9x5KNlueYSKdPNBp1rsvf

Malware Config

Targets

    • Target

      CrackNursultan2.exe

    • Size

      2.1MB

    • MD5

      e9b8ce25037c26fe63171b24f06d04ec

    • SHA1

      e33459bc02a1cd4824bb9f44c89b05dce7e20cec

    • SHA256

      e7706dd5f9b91a20bc5881f9efd75af166942828a426879343df9454f767ece9

    • SHA512

      ace3e8a023c6247b4e52cd09560c7c7f45af357dcaa14f26452741cddb2d09d94816b0e6bc79edefb03aa6e169385f0dfd039feba0e781a0e0884a3859100ef4

    • SSDEEP

      24576:2TbBv5rUyXVs/ZFmQyOMPaRILC9j5oaKACNnAuuyGf2YnSeqjEwJdAXf0YaHssOq:IBJ8zAE9x5KNlueYSKdPNBp1rsvf

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.