General

  • Target

    21a9f82942e3d5b88a1180b1d6bc2082648db67d2d0257b67d07fe531ecfef0e

  • Size

    4.6MB

  • Sample

    230129-1w4n5aee23

  • MD5

    43334042325d6a1a3ae84729cb8b5cb0

  • SHA1

    a1552e1c54b9024db5b75df401f76e510086c80e

  • SHA256

    21a9f82942e3d5b88a1180b1d6bc2082648db67d2d0257b67d07fe531ecfef0e

  • SHA512

    c08e24a7197af85f0446404ba0531cd81d313712b2f83e394b498bc842604f15b181bc93d8220959df315c5e2e7da71b2b25a1ce770e18590f9f2095bef74c61

  • SSDEEP

    98304:IFV3lDzCOXPy7Qf5Iyc4i4iKK8hdC3FuxefuAU8sKzdCu:IdCOVcjmdSF2shzd7

Malware Config

Targets

    • Target

      21a9f82942e3d5b88a1180b1d6bc2082648db67d2d0257b67d07fe531ecfef0e

    • Size

      4.6MB

    • MD5

      43334042325d6a1a3ae84729cb8b5cb0

    • SHA1

      a1552e1c54b9024db5b75df401f76e510086c80e

    • SHA256

      21a9f82942e3d5b88a1180b1d6bc2082648db67d2d0257b67d07fe531ecfef0e

    • SHA512

      c08e24a7197af85f0446404ba0531cd81d313712b2f83e394b498bc842604f15b181bc93d8220959df315c5e2e7da71b2b25a1ce770e18590f9f2095bef74c61

    • SSDEEP

      98304:IFV3lDzCOXPy7Qf5Iyc4i4iKK8hdC3FuxefuAU8sKzdCu:IdCOVcjmdSF2shzd7

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks