General

  • Target

    09f3ea83868d661776bb6231c214c397.exe

  • Size

    2.5MB

  • Sample

    230119-d2216aeb35

  • MD5

    09f3ea83868d661776bb6231c214c397

  • SHA1

    b56d6ebad45ccf765087c4c1666a37dc860da268

  • SHA256

    3a9d578bed5193425becda7f50fdda6b1a131ba35195ae58ac24a2069e967b03

  • SHA512

    48893b7efd2e92fb30956d680706f5877dd635d081aa546a2b73960f0e3aaf0ab381fc8f386a01a87fde22eece21157dd439810e5d714ecf4a64646a828eb912

  • SSDEEP

    49152:CSg8kOqBMdDhtQM4I+MkmJm9LcBwQYdXQ4J:dfkOqGhhtn9+nmJm9LcBCXvJ

Malware Config

Targets

    • Target

      09f3ea83868d661776bb6231c214c397.exe

    • Size

      2.5MB

    • MD5

      09f3ea83868d661776bb6231c214c397

    • SHA1

      b56d6ebad45ccf765087c4c1666a37dc860da268

    • SHA256

      3a9d578bed5193425becda7f50fdda6b1a131ba35195ae58ac24a2069e967b03

    • SHA512

      48893b7efd2e92fb30956d680706f5877dd635d081aa546a2b73960f0e3aaf0ab381fc8f386a01a87fde22eece21157dd439810e5d714ecf4a64646a828eb912

    • SSDEEP

      49152:CSg8kOqBMdDhtQM4I+MkmJm9LcBwQYdXQ4J:dfkOqGhhtn9+nmJm9LcBCXvJ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks