General

  • Target

    Proton Crypter v2.exe

  • Size

    1.2MB

  • Sample

    220729-j5y2kageal

  • MD5

    4507f6a9c9532c1347a44e1f3f4de2b0

  • SHA1

    9166b6628c4d37182c3abc851cb5ebfce9c18521

  • SHA256

    d06b31ccce69bfc88f4de44a28981aaf25bd7bdfba248b5ef2130f7a6cc4d508

  • SHA512

    507a1cd7483a0be27d8078b1d799dfd2b874ce6295e995702c1aa22c6f3fc5391c6a15357d8b398646d64c7fa38c2d189c1fc18539068948e693b2142bc8adda

Malware Config

Targets

    • Target

      Proton Crypter v2.exe

    • Size

      1.2MB

    • MD5

      4507f6a9c9532c1347a44e1f3f4de2b0

    • SHA1

      9166b6628c4d37182c3abc851cb5ebfce9c18521

    • SHA256

      d06b31ccce69bfc88f4de44a28981aaf25bd7bdfba248b5ef2130f7a6cc4d508

    • SHA512

      507a1cd7483a0be27d8078b1d799dfd2b874ce6295e995702c1aa22c6f3fc5391c6a15357d8b398646d64c7fa38c2d189c1fc18539068948e693b2142bc8adda

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect PureCrypter loader

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PureCrypter

      PureCrypter is a loader which is intended for downloading and executing additional payloads.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks