General

  • Target

    51c3cebd8c8fe19e37b68c64218b4c4552aac4c804bd04ed372fd74d52668ff0

  • Size

    1.5MB

  • Sample

    221212-2js8asfh3t

  • MD5

    2bd60604768e532058d654c607ded159

  • SHA1

    7777ccc162b1ab55eda5c22b109c5ebc91f0b469

  • SHA256

    b95be0f98df652640e019ce8bc06dc4999399305834f1b75e981dd7c5a1c0423

  • SHA512

    86ff9828acf99fbf631cde3cde9f63e20fd741d3b95f401239408131eaf711e4223a38fb12a74504292a43179f50b854e86bea17c7431342d658177479326166

  • SSDEEP

    24576:wpbJdN/DEf2d6cXL83+ogefj2fPPCAIPiyRscPl2g4CkPo6rugwdD2bM:EVAfKbXL83+UjIqF6yRsct9ibrzSD24

Malware Config

Targets

    • Target

      51c3cebd8c8fe19e37b68c64218b4c4552aac4c804bd04ed372fd74d52668ff0

    • Size

      2.0MB

    • MD5

      fc9ea28a3c3659c4200e442d20198458

    • SHA1

      79ede873cd08d5941e54524dd85b5add0a79bd7c

    • SHA256

      51c3cebd8c8fe19e37b68c64218b4c4552aac4c804bd04ed372fd74d52668ff0

    • SHA512

      c2357a0eb6fd31929af57c544be2de14b0daee2a731ec09e586b0ac748b7368ae5a022d0d8dae0ccece0fa860799a0da02405f60d86a963e177508b5e4220a17

    • SSDEEP

      49152:ubA3jVKbYcU6bWUfj4a7syRO2tzK/RNS/2t:ubjJXj4a4IKJYet

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks