General

  • Target

    2025-06-15_8146f79ae11096336b80ba3fe03dc45f_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer

  • Size

    2.3MB

  • Sample

    250615-lwj76az1cz

  • MD5

    8146f79ae11096336b80ba3fe03dc45f

  • SHA1

    5024838eb3b4295ec48179257aed4cbfc6d7c257

  • SHA256

    4a39b88e50697480b09882c8302c8f14e6e99fac298f8d790060a7664b4df6f5

  • SHA512

    3f6ccc83ebf51cc29f0353a451205a67b3efdca704612884c5df0bbf79aa4b901e23f32d9a51629ea73c7c43b32076b836f789a335d1c273bd39ef7bb1b8242e

  • SSDEEP

    24576:2TbBv5rUyXVSC/jnEiJsX4UR7xGkV/cmZ+nVL+gVr5I30j0LQoYp7Gb8jGWPutC3:IBJhj7KL7t/uDwS0UhLjGcjs/7wP

Malware Config

Targets

    • Target

      2025-06-15_8146f79ae11096336b80ba3fe03dc45f_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer

    • Size

      2.3MB

    • MD5

      8146f79ae11096336b80ba3fe03dc45f

    • SHA1

      5024838eb3b4295ec48179257aed4cbfc6d7c257

    • SHA256

      4a39b88e50697480b09882c8302c8f14e6e99fac298f8d790060a7664b4df6f5

    • SHA512

      3f6ccc83ebf51cc29f0353a451205a67b3efdca704612884c5df0bbf79aa4b901e23f32d9a51629ea73c7c43b32076b836f789a335d1c273bd39ef7bb1b8242e

    • SSDEEP

      24576:2TbBv5rUyXVSC/jnEiJsX4UR7xGkV/cmZ+nVL+gVr5I30j0LQoYp7Gb8jGWPutC3:IBJhj7KL7t/uDwS0UhLjGcjs/7wP

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks