General
-
Target
Extremeinjector.exe
-
Size
3.8MB
-
Sample
250126-rgmbvsvkhm
-
MD5
23de5c2c4de1af322b48d8fb54f52082
-
SHA1
bace8711338a1c79605866759fadd2c7adbb2630
-
SHA256
cc92c665e4e26f4bf880e69666f019f9d568533510d8ca3d5e4651c1e121231e
-
SHA512
3c592202fda82055fb2ae73bd00dc7c8bbe075b85830469eb81f8605ff34ac62023c2c3c8669bd67bb9622a407a93a047a8d8995fbad324c443bf58422d09ae2
-
SSDEEP
98304:jdkCCK3XXQO18VeWtC7ZoAxFoHzL2SUKaMDmI:jdkCCKnXt1l7ZzSUKawmI
Static task
static1
Behavioral task
behavioral1
Sample
Extremeinjector.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Extremeinjector.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Extremeinjector.exe
-
Size
3.8MB
-
MD5
23de5c2c4de1af322b48d8fb54f52082
-
SHA1
bace8711338a1c79605866759fadd2c7adbb2630
-
SHA256
cc92c665e4e26f4bf880e69666f019f9d568533510d8ca3d5e4651c1e121231e
-
SHA512
3c592202fda82055fb2ae73bd00dc7c8bbe075b85830469eb81f8605ff34ac62023c2c3c8669bd67bb9622a407a93a047a8d8995fbad324c443bf58422d09ae2
-
SSDEEP
98304:jdkCCK3XXQO18VeWtC7ZoAxFoHzL2SUKaMDmI:jdkCCKnXt1l7ZzSUKawmI
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3