General

  • Target

    00009e23a8bcbb7323c15448165dc6cc.exe

  • Size

    2.3MB

  • Sample

    230126-3v5k5sfh37

  • MD5

    00009e23a8bcbb7323c15448165dc6cc

  • SHA1

    2b5050619a50c63d487ed07651be88d1a8ab92d6

  • SHA256

    bceca4720a9dfb62bf4f5130f9443e6fe40f24fb440df17a51b29340575805c0

  • SHA512

    e5f88177c022f80bef16a225679211484f8b12a6f7fdf41c9b94a7a6604578ab413d8a9020231bb55f54a4233c912a7d10837207fce69ce157f4da8717878a41

  • SSDEEP

    49152:oEAW6oV1uWgMzCAKcNqGAonnXvjGt8YxKIh3i2L:LADWgmNqGAKKBli

Malware Config

Targets

    • Target

      00009e23a8bcbb7323c15448165dc6cc.exe

    • Size

      2.3MB

    • MD5

      00009e23a8bcbb7323c15448165dc6cc

    • SHA1

      2b5050619a50c63d487ed07651be88d1a8ab92d6

    • SHA256

      bceca4720a9dfb62bf4f5130f9443e6fe40f24fb440df17a51b29340575805c0

    • SHA512

      e5f88177c022f80bef16a225679211484f8b12a6f7fdf41c9b94a7a6604578ab413d8a9020231bb55f54a4233c912a7d10837207fce69ce157f4da8717878a41

    • SSDEEP

      49152:oEAW6oV1uWgMzCAKcNqGAonnXvjGt8YxKIh3i2L:LADWgmNqGAKKBli

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks