General

  • Target

    7E649C9E6325C46601A81FD6C0DBF36EE6C85D0EE108C.exe

  • Size

    1.9MB

  • Sample

    230119-dsgc4adg89

  • MD5

    3b15c55bae9fefd6585e43490f6bf231

  • SHA1

    3e1815ec0f2fcc83c1aef7173baf749e4547f967

  • SHA256

    7e649c9e6325c46601a81fd6c0dbf36ee6c85d0ee108c333b283140f96b842f6

  • SHA512

    43b870f7feaf9b1290acd23f17d0b22ea678ef93f52b5d89e11f85dc87c6306e3fd45e151784001f502d2261f153737a82578a31cfdf1edd93f8b31d6a86b4bc

  • SSDEEP

    49152:Mb3eYn9rEj80t2CttDha8bCgXLQHkfX68lSurk9JWBKM:MlnmwWttPbC+R68l89r

Malware Config

Targets

    • Target

      7E649C9E6325C46601A81FD6C0DBF36EE6C85D0EE108C.exe

    • Size

      1.9MB

    • MD5

      3b15c55bae9fefd6585e43490f6bf231

    • SHA1

      3e1815ec0f2fcc83c1aef7173baf749e4547f967

    • SHA256

      7e649c9e6325c46601a81fd6c0dbf36ee6c85d0ee108c333b283140f96b842f6

    • SHA512

      43b870f7feaf9b1290acd23f17d0b22ea678ef93f52b5d89e11f85dc87c6306e3fd45e151784001f502d2261f153737a82578a31cfdf1edd93f8b31d6a86b4bc

    • SSDEEP

      49152:Mb3eYn9rEj80t2CttDha8bCgXLQHkfX68lSurk9JWBKM:MlnmwWttPbC+R68l89r

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks