General

  • Target

    HEUR-Trojan-Spy.MSIL.Stealer.gen-069818f3ba31.exe

  • Size

    1.4MB

  • Sample

    230117-bc823agb97

  • MD5

    713e9e1e0c47b99a953ae2b751faf8d0

  • SHA1

    37f1f0e9fa5698d1daea2a94533d92ea020b154d

  • SHA256

    069818f3ba3127037ffe26196a6fb9f63471492e0c2ec5553ec160a192d812a2

  • SHA512

    c665be420e7a745b916c895751d0cd923b67dff5bb06eea96ac367b3176829b8e217c344c12276bc206abc2fd384bbe1b74d7df0fee287146d68771422c3be64

  • SSDEEP

    24576:u2G/nvxW3WieCY6dk2xGFNPYJCNAUuF23Gyxibkbl+4J:ubA3jYwVGP3yU62nsq

Malware Config

Targets

    • Target

      HEUR-Trojan-Spy.MSIL.Stealer.gen-069818f3ba31.exe

    • Size

      1.4MB

    • MD5

      713e9e1e0c47b99a953ae2b751faf8d0

    • SHA1

      37f1f0e9fa5698d1daea2a94533d92ea020b154d

    • SHA256

      069818f3ba3127037ffe26196a6fb9f63471492e0c2ec5553ec160a192d812a2

    • SHA512

      c665be420e7a745b916c895751d0cd923b67dff5bb06eea96ac367b3176829b8e217c344c12276bc206abc2fd384bbe1b74d7df0fee287146d68771422c3be64

    • SSDEEP

      24576:u2G/nvxW3WieCY6dk2xGFNPYJCNAUuF23Gyxibkbl+4J:ubA3jYwVGP3yU62nsq

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks