General

  • Target

    8282EA0066E14F2E7CAF51B7A7D50DC1.exe

  • Size

    1.0MB

  • Sample

    210615-tarexz32ax

  • MD5

    8282ea0066e14f2e7caf51b7a7d50dc1

  • SHA1

    83c03517bb11c4ef01ced0b8df76cb35acbf4fdd

  • SHA256

    db57de1bf0b133303c2325117a527f1586e4bf6af56219391a17095efb09cc76

  • SHA512

    b48e2b9c226f57c50b5e58d716a906e9753f254136697e3e32c5f6aba2c6cc0a3175b0b290630949ddb4229a8eda53e5b62d03c969f5ef187963302ecc9e6841

Malware Config

Targets

    • Target

      8282EA0066E14F2E7CAF51B7A7D50DC1.exe

    • Size

      1.0MB

    • MD5

      8282ea0066e14f2e7caf51b7a7d50dc1

    • SHA1

      83c03517bb11c4ef01ced0b8df76cb35acbf4fdd

    • SHA256

      db57de1bf0b133303c2325117a527f1586e4bf6af56219391a17095efb09cc76

    • SHA512

      b48e2b9c226f57c50b5e58d716a906e9753f254136697e3e32c5f6aba2c6cc0a3175b0b290630949ddb4229a8eda53e5b62d03c969f5ef187963302ecc9e6841

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat Payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Tasks