General

  • Target

    UDS-Trojan-PSW.MSIL.Tepfer.gen-09342b36eeaad2.exe

  • Size

    2.4MB

  • Sample

    230117-r76hesdh2v

  • MD5

    b8ebe55c83b79c2f0c4c15ac4ec8c3a0

  • SHA1

    c13137e3bfb16f61e5c69f60248be578bdd70551

  • SHA256

    09342b36eeaad27a94f1fd6817bf161cf1c9194709ce8fe869afccd4239f4db3

  • SHA512

    93778d19151b28cfea617ca64e707d43a6bcb342bb502ea2e9723200f71a2f26cea3f1f128e7252528eb586e85eb35b47b08afd58056aaf1c84fdd29a57feb9b

  • SSDEEP

    49152:ubA34q6DjV16+6mCoG4HWT9TV6fsmLp3nfw9heL5fE3zdbg1NG:ubRDjV1x6mCoPYofsy9wvg5fgzd0HG

Score
10/10

Malware Config

Targets

    • Target

      UDS-Trojan-PSW.MSIL.Tepfer.gen-09342b36eeaad2.exe

    • Size

      2.4MB

    • MD5

      b8ebe55c83b79c2f0c4c15ac4ec8c3a0

    • SHA1

      c13137e3bfb16f61e5c69f60248be578bdd70551

    • SHA256

      09342b36eeaad27a94f1fd6817bf161cf1c9194709ce8fe869afccd4239f4db3

    • SHA512

      93778d19151b28cfea617ca64e707d43a6bcb342bb502ea2e9723200f71a2f26cea3f1f128e7252528eb586e85eb35b47b08afd58056aaf1c84fdd29a57feb9b

    • SSDEEP

      49152:ubA34q6DjV16+6mCoG4HWT9TV6fsmLp3nfw9heL5fE3zdbg1NG:ubRDjV1x6mCoPYofsy9wvg5fgzd0HG

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks