General

  • Target

    1e9d648839d6df31421c48fc5a58fdb1.exe

  • Size

    1.3MB

  • Sample

    230119-dwbxsaah5s

  • MD5

    1e9d648839d6df31421c48fc5a58fdb1

  • SHA1

    8824a936225692b169bf16491e85f71149a15a90

  • SHA256

    c66b91cd0446d231445052af25b86edc15127b4313e40457f6697850da21810d

  • SHA512

    02a41349d165462c777970bbc41c5b3b86ad2b5af68c62e7f6e248fb3e169d9ac065039630848d1631a0e10ef43b6870d69c85f20e24904c8e638b6cf8e0f7ea

  • SSDEEP

    24576:kOHLrVJI42Vq2TjMqmMdTjtFSV3pwcaHigoqOIW1Khv:h1JCVm5UxFsGVl

Malware Config

Targets

    • Target

      1e9d648839d6df31421c48fc5a58fdb1.exe

    • Size

      1.3MB

    • MD5

      1e9d648839d6df31421c48fc5a58fdb1

    • SHA1

      8824a936225692b169bf16491e85f71149a15a90

    • SHA256

      c66b91cd0446d231445052af25b86edc15127b4313e40457f6697850da21810d

    • SHA512

      02a41349d165462c777970bbc41c5b3b86ad2b5af68c62e7f6e248fb3e169d9ac065039630848d1631a0e10ef43b6870d69c85f20e24904c8e638b6cf8e0f7ea

    • SSDEEP

      24576:kOHLrVJI42Vq2TjMqmMdTjtFSV3pwcaHigoqOIW1Khv:h1JCVm5UxFsGVl

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks