General

  • Target

    afb679b10d49b2052e1239c345dee646.exe

  • Size

    3.0MB

  • Sample

    230127-anb12ahc8y

  • MD5

    afb679b10d49b2052e1239c345dee646

  • SHA1

    5cc8ce5753431b0cc4901aa53d8489e37a91c672

  • SHA256

    70e310463aea47e2121969f8a96000a72c44ce574e2786a0e4d5e472ce35f998

  • SHA512

    14983d548e071cd85973739f6056a9ab9ca3392f8f1aa3054ec05cfccaafd00135bfa1cdfc83fad26e5adee35c8f5d2d470e296eaba3cee8d7f7e896d47fb967

  • SSDEEP

    49152:hwQVR+A3rrXAafICZyKC5iEqpVJ2pfexGqjNJ8JrSwAca2R7TQALtMiTdUdvVSMt:hwQVP7x6iEgBxVr8lMfkT1DBUdvge9Gi

Malware Config

Targets

    • Target

      afb679b10d49b2052e1239c345dee646.exe

    • Size

      3.0MB

    • MD5

      afb679b10d49b2052e1239c345dee646

    • SHA1

      5cc8ce5753431b0cc4901aa53d8489e37a91c672

    • SHA256

      70e310463aea47e2121969f8a96000a72c44ce574e2786a0e4d5e472ce35f998

    • SHA512

      14983d548e071cd85973739f6056a9ab9ca3392f8f1aa3054ec05cfccaafd00135bfa1cdfc83fad26e5adee35c8f5d2d470e296eaba3cee8d7f7e896d47fb967

    • SSDEEP

      49152:hwQVR+A3rrXAafICZyKC5iEqpVJ2pfexGqjNJ8JrSwAca2R7TQALtMiTdUdvVSMt:hwQVP7x6iEgBxVr8lMfkT1DBUdvge9Gi

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks