General
-
Target
SecuriteInfo.com.Trojan.Siggen31.9411.1178.4099.exe
-
Size
7.8MB
-
Sample
250420-kjtqdssns7
-
MD5
a5d2cfff273ff2896651620edbfbf2ff
-
SHA1
eedcc55e4d6132e933b83e78ec0f6b27920706f7
-
SHA256
c7f5161e69a1f7de4f87d1eaa680f045e84869d888c9c68c1ffc4ec6d1a95207
-
SHA512
6cf7a9448914ecf029d9a02c7d084f1f44c08d54fe2ae8f59198544ef22a11f7a8aa1f403f1d3d33cc363bc8cbe43f50177c6dfd4b3cdfdd55086738961e0464
-
SSDEEP
98304:fyfoRvySuOauKO0dc9MxBhceGJ8U3IpaGmTU:aAh+cu3hceq8U3OaGs
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen31.9411.1178.4099.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen31.9411.1178.4099.exe
Resource
win11-20250410-en
Malware Config
Extracted
xworm
89.39.121.169:9000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
umbral
https://discord.com/api/webhooks/1333154187097411584/digMymw3Ra3L6I5D8zGVEzUUedj3jMIaMra4MYEhFwT7XO6iinul-zQfNDxgOfoV2lrG
Targets
-
-
Target
SecuriteInfo.com.Trojan.Siggen31.9411.1178.4099.exe
-
Size
7.8MB
-
MD5
a5d2cfff273ff2896651620edbfbf2ff
-
SHA1
eedcc55e4d6132e933b83e78ec0f6b27920706f7
-
SHA256
c7f5161e69a1f7de4f87d1eaa680f045e84869d888c9c68c1ffc4ec6d1a95207
-
SHA512
6cf7a9448914ecf029d9a02c7d084f1f44c08d54fe2ae8f59198544ef22a11f7a8aa1f403f1d3d33cc363bc8cbe43f50177c6dfd4b3cdfdd55086738961e0464
-
SSDEEP
98304:fyfoRvySuOauKO0dc9MxBhceGJ8U3IpaGmTU:aAh+cu3hceq8U3OaGs
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Umbral payload
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Umbral family
-
Xmrig family
-
Xworm family
-
XMRig Miner payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1