General

  • Target

    tmp

  • Size

    1.4MB

  • Sample

    221021-fk849acgeq

  • MD5

    93b1b73283a7f2fc2ed2c03a7a6eb1cc

  • SHA1

    46ea510204654f88c813b580af24860085f4bafc

  • SHA256

    ece5d984948d86af69547410313ff98743d52586a649ac7d132900a27864432a

  • SHA512

    6ce5e38149d0ba4c6c399d1ce8064762952ba703901047839419f413fa3cb3605f466b3bb879aca179dae41108949a182a0609e9843564659ff5bf9002af4645

  • SSDEEP

    24576:u2G/nvxW3WieC1Ab5W7eGoXKQZc+J/E11cCdbVkTQD33:ubA3jOb5WTeZc+5CdbV8QDn

Malware Config

Targets

    • Target

      tmp

    • Size

      1.4MB

    • MD5

      93b1b73283a7f2fc2ed2c03a7a6eb1cc

    • SHA1

      46ea510204654f88c813b580af24860085f4bafc

    • SHA256

      ece5d984948d86af69547410313ff98743d52586a649ac7d132900a27864432a

    • SHA512

      6ce5e38149d0ba4c6c399d1ce8064762952ba703901047839419f413fa3cb3605f466b3bb879aca179dae41108949a182a0609e9843564659ff5bf9002af4645

    • SSDEEP

      24576:u2G/nvxW3WieC1Ab5W7eGoXKQZc+J/E11cCdbVkTQD33:ubA3jOb5WTeZc+5CdbV8QDn

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks