General

  • Target

    064b898ede27a84a3e4871a71995d465.exe

  • Size

    2.6MB

  • Sample

    230121-matp5sbg87

  • MD5

    064b898ede27a84a3e4871a71995d465

  • SHA1

    36173d3eddee0c8ee70bd2e87aa4e849dbdd4fa8

  • SHA256

    562a1dec9ac82149ac38f953ef5a86a0665e68643fc1cafaf1d25019225aa226

  • SHA512

    3799b9abf76e196abc3b4a5cc0d8dc237ad1f9adbfeb69298683589b5ec57e628624ad182c74d3e13890481c2d21ce00726581ee032559d06a09c30e8cd8b4f8

  • SSDEEP

    49152:UbA30Rl9ciSsySFEDetTA7r3jnvBxZQ6u+ducTE6:UbVlCBsy2CetTAHrDZ1uiucTE6

Malware Config

Targets

    • Target

      064b898ede27a84a3e4871a71995d465.exe

    • Size

      2.6MB

    • MD5

      064b898ede27a84a3e4871a71995d465

    • SHA1

      36173d3eddee0c8ee70bd2e87aa4e849dbdd4fa8

    • SHA256

      562a1dec9ac82149ac38f953ef5a86a0665e68643fc1cafaf1d25019225aa226

    • SHA512

      3799b9abf76e196abc3b4a5cc0d8dc237ad1f9adbfeb69298683589b5ec57e628624ad182c74d3e13890481c2d21ce00726581ee032559d06a09c30e8cd8b4f8

    • SSDEEP

      49152:UbA30Rl9ciSsySFEDetTA7r3jnvBxZQ6u+ducTE6:UbVlCBsy2CetTAHrDZ1uiucTE6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks