General
-
Target
2025-03-31_029485bc2a80896f65c286885494122b_black-basta_cova_luca-stealer
-
Size
768KB
-
Sample
250331-lkdk8swwdy
-
MD5
029485bc2a80896f65c286885494122b
-
SHA1
066cc229177c6ecd6dd2547e8aaa1b6d72f1255a
-
SHA256
93fe21dbb3bb181c61b9c3f40abd04130f83bf7ce906ba73394045896c5019fc
-
SHA512
11faa56e87f530fb481dc1df1ab53392fb3aba925df953b7c80a2db9c5982cd27321c0251ba6d42e7d3ed4c5c53cba0139114f99f4d56d25941d94a978991fca
-
SSDEEP
12288:2ToPWBv/cpGrU3yVtX+t4VlqQw7RuGY8pFV8P0wv7DfA3GdRzgs9/45aykxfIaC:2TbBv5rUyXVLMTr00y3ddRcg/Dy6fy
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_029485bc2a80896f65c286885494122b_black-basta_cova_luca-stealer.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
89.39.121.169:9000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
2025-03-31_029485bc2a80896f65c286885494122b_black-basta_cova_luca-stealer
-
Size
768KB
-
MD5
029485bc2a80896f65c286885494122b
-
SHA1
066cc229177c6ecd6dd2547e8aaa1b6d72f1255a
-
SHA256
93fe21dbb3bb181c61b9c3f40abd04130f83bf7ce906ba73394045896c5019fc
-
SHA512
11faa56e87f530fb481dc1df1ab53392fb3aba925df953b7c80a2db9c5982cd27321c0251ba6d42e7d3ed4c5c53cba0139114f99f4d56d25941d94a978991fca
-
SSDEEP
12288:2ToPWBv/cpGrU3yVtX+t4VlqQw7RuGY8pFV8P0wv7DfA3GdRzgs9/45aykxfIaC:2TbBv5rUyXVLMTr00y3ddRcg/Dy6fy
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
DCRat payload
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2