General

  • Target

    17367f89a9787ad1b7a0396701caefb2.exe

  • Size

    2.6MB

  • Sample

    220925-en3afaedhq

  • MD5

    17367f89a9787ad1b7a0396701caefb2

  • SHA1

    111be9fe32a2766478b859e76c3a2c491eb740d5

  • SHA256

    381dc1b9c2aa823df0808b98780252517c090e9635614ac35835cf9238082151

  • SHA512

    18d3b1f345417c17f58d0d5019e0fdacbbb57d8cdfba44d21dd8c56727801e8cf677d24598af0756f02b86518711470f2657ff301fe0b3d04836c34e9e2a7283

  • SSDEEP

    49152:PpTn80rAHkSrvT7yEBpojAGw3fo+5D0gRbfGNW8UlbSpDCP2XF:PZpktrvTOqp2Nw3L0gRbfGI8sepeu1

Malware Config

Targets

    • Target

      17367f89a9787ad1b7a0396701caefb2.exe

    • Size

      2.6MB

    • MD5

      17367f89a9787ad1b7a0396701caefb2

    • SHA1

      111be9fe32a2766478b859e76c3a2c491eb740d5

    • SHA256

      381dc1b9c2aa823df0808b98780252517c090e9635614ac35835cf9238082151

    • SHA512

      18d3b1f345417c17f58d0d5019e0fdacbbb57d8cdfba44d21dd8c56727801e8cf677d24598af0756f02b86518711470f2657ff301fe0b3d04836c34e9e2a7283

    • SSDEEP

      49152:PpTn80rAHkSrvT7yEBpojAGw3fo+5D0gRbfGNW8UlbSpDCP2XF:PZpktrvTOqp2Nw3L0gRbfGI8sepeu1

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Tasks