General

  • Target

    28ebd60f492ca0957ac7ab3fdbcd8262966dee60dbec71d6bcac8d7efaf65479.zip

  • Size

    15.6MB

  • Sample

    221225-278b5acc56

  • MD5

    eb93bb98b4e0d01353c5706cd04decc7

  • SHA1

    1ab3a1414e2c2681c32c19f11e837720241d4511

  • SHA256

    82e29a0166df43cfe0fd762b8274149e3385606635e977f86d814c6f722be67f

  • SHA512

    d77005af054fcbae4557158062a2ba5a73e33ff1b9593afc38dc70c0d86a50c7df857359e28a25ecdb246ce772cbee65903b7835bfc8d96eec0fdd804afc330c

  • SSDEEP

    393216:FdWA9oac59Fx9E0yvXm5n1ybw0r0wTmMAkth6f:mL39jBv5n1ybwg5TmM1M

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ipinfo.io/ip

Targets

    • Target

      tmp

    • Size

      15.7MB

    • MD5

      b27e540aef37c99f3cfd2766c2e61784

    • SHA1

      c516b74daec17d1bc788c54433cf10899ee07e92

    • SHA256

      28ebd60f492ca0957ac7ab3fdbcd8262966dee60dbec71d6bcac8d7efaf65479

    • SHA512

      641d5daaef91d535f279ce7fea1f7c8b50ba87040480602e51951dfc2f3345699d3161d38b1b2ab7b3d4fbbcc56e0d597f125ed65ea3971df4888cb4a63897cd

    • SSDEEP

      393216:XhBqJ0CE8/eXkkM7cGGBNpuXU8ysXVqNIyc2KBcr27eEHTPX:RBe0CiMihuXU8yYqNIygdrX

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Modifies security service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks