General

  • Target

    Extremeinjector.exe

  • Size

    3.8MB

  • Sample

    250126-rgmbvsvkhm

  • MD5

    23de5c2c4de1af322b48d8fb54f52082

  • SHA1

    bace8711338a1c79605866759fadd2c7adbb2630

  • SHA256

    cc92c665e4e26f4bf880e69666f019f9d568533510d8ca3d5e4651c1e121231e

  • SHA512

    3c592202fda82055fb2ae73bd00dc7c8bbe075b85830469eb81f8605ff34ac62023c2c3c8669bd67bb9622a407a93a047a8d8995fbad324c443bf58422d09ae2

  • SSDEEP

    98304:jdkCCK3XXQO18VeWtC7ZoAxFoHzL2SUKaMDmI:jdkCCKnXt1l7ZzSUKawmI

Malware Config

Targets

    • Target

      Extremeinjector.exe

    • Size

      3.8MB

    • MD5

      23de5c2c4de1af322b48d8fb54f52082

    • SHA1

      bace8711338a1c79605866759fadd2c7adbb2630

    • SHA256

      cc92c665e4e26f4bf880e69666f019f9d568533510d8ca3d5e4651c1e121231e

    • SHA512

      3c592202fda82055fb2ae73bd00dc7c8bbe075b85830469eb81f8605ff34ac62023c2c3c8669bd67bb9622a407a93a047a8d8995fbad324c443bf58422d09ae2

    • SSDEEP

      98304:jdkCCK3XXQO18VeWtC7ZoAxFoHzL2SUKaMDmI:jdkCCKnXt1l7ZzSUKawmI

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks