Resubmissions

11-01-2021 13:09

210111-dlhjyngw66 8

11-01-2021 07:36

210111-xfhgmxjy6n 10

General

  • Target

    4ced2056e4efe1c93b9f4adaaeaba20c.exe

  • Size

    607KB

  • Sample

    210111-xfhgmxjy6n

  • MD5

    4ced2056e4efe1c93b9f4adaaeaba20c

  • SHA1

    b975777c42d7d8fb04c34a2efc64dc5e4c574712

  • SHA256

    f6a307d243c407c27489de37adac83e9205be531cbb4e2cb71545627faf813fd

  • SHA512

    014df0ad54bf23335f964fa4e313a91b60b3ea2c62b73a306e973177830b573666aaebc1932cafa766042f34b8e32adcfabe3027aae2cc09341fd138a8963eaf

Malware Config

Targets

    • Target

      4ced2056e4efe1c93b9f4adaaeaba20c.exe

    • Size

      607KB

    • MD5

      4ced2056e4efe1c93b9f4adaaeaba20c

    • SHA1

      b975777c42d7d8fb04c34a2efc64dc5e4c574712

    • SHA256

      f6a307d243c407c27489de37adac83e9205be531cbb4e2cb71545627faf813fd

    • SHA512

      014df0ad54bf23335f964fa4e313a91b60b3ea2c62b73a306e973177830b573666aaebc1932cafa766042f34b8e32adcfabe3027aae2cc09341fd138a8963eaf

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DC Rat Payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks