General

  • Target

    Mefolis.exe

  • Size

    2.1MB

  • Sample

    230123-zkvreafd46

  • MD5

    4cec961d70acca93a3ba9ef751a6148e

  • SHA1

    3073d86f539283571debb31f074c8c5d657bbb61

  • SHA256

    5623347388fc45acd294e716d177fcfe0a9240a118a63a1b4c1aff16decbc688

  • SHA512

    e2db3e7397608d45f720f9037e2516da8769259a0be73f3847169992f9ad3fbdaef2fa4df8e5175afc8dbbdba5c07a1b23bd3d5d3347dc2822d1175f8ca19659

  • SSDEEP

    49152:UbA30QIb95L66TpclrNsIqhXNDWm5wD5cRc8:UbsG95dp+sIqr6VDORc8

Malware Config

Targets

    • Target

      Mefolis.exe

    • Size

      2.1MB

    • MD5

      4cec961d70acca93a3ba9ef751a6148e

    • SHA1

      3073d86f539283571debb31f074c8c5d657bbb61

    • SHA256

      5623347388fc45acd294e716d177fcfe0a9240a118a63a1b4c1aff16decbc688

    • SHA512

      e2db3e7397608d45f720f9037e2516da8769259a0be73f3847169992f9ad3fbdaef2fa4df8e5175afc8dbbdba5c07a1b23bd3d5d3347dc2822d1175f8ca19659

    • SSDEEP

      49152:UbA30QIb95L66TpclrNsIqhXNDWm5wD5cRc8:UbsG95dp+sIqr6VDORc8

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks