General

  • Target

    2025-04-04_7ceeaab80e3c4481ebc4a025857bc0fe_black-basta_cova_luca-stealer

  • Size

    3.8MB

  • Sample

    250404-gcytzstks9

  • MD5

    7ceeaab80e3c4481ebc4a025857bc0fe

  • SHA1

    6b821230811b3e85befa6549374862a21f9c041b

  • SHA256

    d09ecf875a5673d913c9162b9483331043bc8c17d61d24c51e92269ca29afd62

  • SHA512

    92b8bb20771aae6f40f3da8bec754541f2b10d51aa30c493ab4b26d3e9d05416f29905954968cc1a8a013b013b8f26aeef011338e0f161b7dc4235ef91230ec9

  • SSDEEP

    98304:bIVsEgIT4bNJFY3OqtEy7iS1ceWg8ioKgcEZm:bCOjBHY0ciSiGoKU0

Malware Config

Targets

    • Target

      2025-04-04_7ceeaab80e3c4481ebc4a025857bc0fe_black-basta_cova_luca-stealer

    • Size

      3.8MB

    • MD5

      7ceeaab80e3c4481ebc4a025857bc0fe

    • SHA1

      6b821230811b3e85befa6549374862a21f9c041b

    • SHA256

      d09ecf875a5673d913c9162b9483331043bc8c17d61d24c51e92269ca29afd62

    • SHA512

      92b8bb20771aae6f40f3da8bec754541f2b10d51aa30c493ab4b26d3e9d05416f29905954968cc1a8a013b013b8f26aeef011338e0f161b7dc4235ef91230ec9

    • SSDEEP

      98304:bIVsEgIT4bNJFY3OqtEy7iS1ceWg8ioKgcEZm:bCOjBHY0ciSiGoKU0

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks