General

  • Target

    HEUR-Trojan-Spy.MSIL.Stealer.gen-21b581a0eee0.exe

  • Size

    1.3MB

  • Sample

    230116-3pesjafd25

  • MD5

    67332c4b46c0b9f29d331cafc6aa3564

  • SHA1

    5c409710f34b49a25ceb4773b879ebcc0c4ad610

  • SHA256

    21b581a0eee089081f0ee4b52641b33565240499a2eaf2fd7bd0123ee584e98d

  • SHA512

    9125cc8fed810522e2929c34a8d6dfbbfab2a03d5ee761fb4d86768ac9259e41bc3b57892375301afc3bacd00dd92d13d26f60147455c9d5e224feb812ff3ba7

  • SSDEEP

    24576:MzaHCAvwbSr2sTzNratLY5gaTfcb+MeZvD6PdG942L+EUL++4:MzEZwbSrf3mFpAKGP+J

Malware Config

Targets

    • Target

      HEUR-Trojan-Spy.MSIL.Stealer.gen-21b581a0eee0.exe

    • Size

      1.3MB

    • MD5

      67332c4b46c0b9f29d331cafc6aa3564

    • SHA1

      5c409710f34b49a25ceb4773b879ebcc0c4ad610

    • SHA256

      21b581a0eee089081f0ee4b52641b33565240499a2eaf2fd7bd0123ee584e98d

    • SHA512

      9125cc8fed810522e2929c34a8d6dfbbfab2a03d5ee761fb4d86768ac9259e41bc3b57892375301afc3bacd00dd92d13d26f60147455c9d5e224feb812ff3ba7

    • SSDEEP

      24576:MzaHCAvwbSr2sTzNratLY5gaTfcb+MeZvD6PdG942L+EUL++4:MzEZwbSrf3mFpAKGP+J

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks