General

  • Target

    skillprotectV2.exe

  • Size

    226KB

  • Sample

    250204-3dyq9sxpct

  • MD5

    309c2c3c3bf0c657af55e0f26117ab03

  • SHA1

    749be0ef8828086b20a292b5e71da4f52e2a9416

  • SHA256

    7bc24cf4fdcb184014b58751e2147d9161517808c3db3779fc41915fb493c87e

  • SHA512

    e81578aff2cd6ff96f5564d043a20682a6e381a03d71e1326c9ef9c896b886956f9bf984e4e75eb232dc692295a12d942938bfbae06515f1b75fdda4af1c1dc5

  • SSDEEP

    3072:UsZpi2QxmGgbGDyyOo9dhtrBTVgwby94wZxJzQyW:Usbi2QxYGDxbL1W91z

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7944456076:AAGpjhHLrlnhpd2D6D-Z8494fRloZ5j7GY0/sendDocument

Targets

    • Target

      skillprotectV2.exe

    • Size

      226KB

    • MD5

      309c2c3c3bf0c657af55e0f26117ab03

    • SHA1

      749be0ef8828086b20a292b5e71da4f52e2a9416

    • SHA256

      7bc24cf4fdcb184014b58751e2147d9161517808c3db3779fc41915fb493c87e

    • SHA512

      e81578aff2cd6ff96f5564d043a20682a6e381a03d71e1326c9ef9c896b886956f9bf984e4e75eb232dc692295a12d942938bfbae06515f1b75fdda4af1c1dc5

    • SSDEEP

      3072:UsZpi2QxmGgbGDyyOo9dhtrBTVgwby94wZxJzQyW:Usbi2QxYGDxbL1W91z

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Windows security bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks