General

  • Target

    6bc8e9b4f56dbc05381a533fb79de064777e0908.exe

  • Size

    1.4MB

  • Sample

    210629-wwwwza5md6

  • MD5

    06210726d03e38539113a6bcc4c5625c

  • SHA1

    6bc8e9b4f56dbc05381a533fb79de064777e0908

  • SHA256

    748f35be261019103aae31d43b1fa88fda9cbc99043122e76b5c0a0d94cb808f

  • SHA512

    5ae3ab22299e45ce77244dd8701d69ef71651bb2fcbbc095eddc8c4fbf267fb3a7f3aece6eb1d2ed8fa4f402d05959f2075be9f1f42c5c4a9ad27f47f13d4ad8

Malware Config

Targets

    • Target

      6bc8e9b4f56dbc05381a533fb79de064777e0908.exe

    • Size

      1.4MB

    • MD5

      06210726d03e38539113a6bcc4c5625c

    • SHA1

      6bc8e9b4f56dbc05381a533fb79de064777e0908

    • SHA256

      748f35be261019103aae31d43b1fa88fda9cbc99043122e76b5c0a0d94cb808f

    • SHA512

      5ae3ab22299e45ce77244dd8701d69ef71651bb2fcbbc095eddc8c4fbf267fb3a7f3aece6eb1d2ed8fa4f402d05959f2075be9f1f42c5c4a9ad27f47f13d4ad8

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • DCRat Payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks