General

  • Target

    b68945406413301b4a5195cda123ef91.exe

  • Size

    2.3MB

  • Sample

    230127-dsf3bsgc56

  • MD5

    b68945406413301b4a5195cda123ef91

  • SHA1

    3ee195713743c21c2d0576a4c37a3bb2687f601a

  • SHA256

    7efd49f4c002fbe6c0380ae3da89cab96456090a2a9ea148fec6fc5263433d78

  • SHA512

    ff6686870938b901d765af2085f60cb1a7a7698c14a6e2c41d0f03c536e0c4fa894cdb4c455904197c5cd2c282e049b230014c99c3f318ea1536f7e21ff5ade5

  • SSDEEP

    49152:4EAW6oV1uWgMzCAKcNqGAonnXvjGt8YxKIh3i2L:bADWgmNqGAKKBli

Malware Config

Targets

    • Target

      b68945406413301b4a5195cda123ef91.exe

    • Size

      2.3MB

    • MD5

      b68945406413301b4a5195cda123ef91

    • SHA1

      3ee195713743c21c2d0576a4c37a3bb2687f601a

    • SHA256

      7efd49f4c002fbe6c0380ae3da89cab96456090a2a9ea148fec6fc5263433d78

    • SHA512

      ff6686870938b901d765af2085f60cb1a7a7698c14a6e2c41d0f03c536e0c4fa894cdb4c455904197c5cd2c282e049b230014c99c3f318ea1536f7e21ff5ade5

    • SSDEEP

      49152:4EAW6oV1uWgMzCAKcNqGAonnXvjGt8YxKIh3i2L:bADWgmNqGAKKBli

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks