General
-
Target
28ebd60f492ca0957ac7ab3fdbcd8262966dee60dbec71d6bcac8d7efaf65479.zip
-
Size
15.6MB
-
Sample
221225-278b5acc56
-
MD5
eb93bb98b4e0d01353c5706cd04decc7
-
SHA1
1ab3a1414e2c2681c32c19f11e837720241d4511
-
SHA256
82e29a0166df43cfe0fd762b8274149e3385606635e977f86d814c6f722be67f
-
SHA512
d77005af054fcbae4557158062a2ba5a73e33ff1b9593afc38dc70c0d86a50c7df857359e28a25ecdb246ce772cbee65903b7835bfc8d96eec0fdd804afc330c
-
SSDEEP
393216:FdWA9oac59Fx9E0yvXm5n1ybw0r0wTmMAkth6f:mL39jBv5n1ybwg5TmM1M
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral3
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
https://ipinfo.io/ip
Targets
-
-
Target
tmp
-
Size
15.7MB
-
MD5
b27e540aef37c99f3cfd2766c2e61784
-
SHA1
c516b74daec17d1bc788c54433cf10899ee07e92
-
SHA256
28ebd60f492ca0957ac7ab3fdbcd8262966dee60dbec71d6bcac8d7efaf65479
-
SHA512
641d5daaef91d535f279ce7fea1f7c8b50ba87040480602e51951dfc2f3345699d3161d38b1b2ab7b3d4fbbcc56e0d597f125ed65ea3971df4888cb4a63897cd
-
SSDEEP
393216:XhBqJ0CE8/eXkkM7cGGBNpuXU8ysXVqNIyc2KBcr27eEHTPX:RBe0CiMihuXU8yYqNIygdrX
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Modifies security service
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-