General

  • Target

    c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2

  • Size

    5.7MB

  • Sample

    230129-srns4sde7x

  • MD5

    9ca968e7fe7c40a6324e047ccca6a7d6

  • SHA1

    c48a0f1bbcf242e50b5239c72bfcd32dd64eaad7

  • SHA256

    c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2

  • SHA512

    9e33e3584dacc531516bb98ead6a151c250c82f3518d2b3c44347ed2fee2f99285457f9a1d8752bc06ea48dfee267a07a4ce834d7155766352930bcc65c34b98

  • SSDEEP

    98304:ZTEWU8jUj8sS/MZIZPP0G/tY1QWDIJbjRH5ux9fgAfBmRGUU3CF/5NCDNxX5EGVE:pUlIsGMZEP8G/tmQGyjRUx9hBmUeIFC1

Malware Config

Targets

    • Target

      c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2

    • Size

      5.7MB

    • MD5

      9ca968e7fe7c40a6324e047ccca6a7d6

    • SHA1

      c48a0f1bbcf242e50b5239c72bfcd32dd64eaad7

    • SHA256

      c1d0b2c516e0ccd591338611ec76efb6c26ba1731de37c50c7c443bdb027c2a2

    • SHA512

      9e33e3584dacc531516bb98ead6a151c250c82f3518d2b3c44347ed2fee2f99285457f9a1d8752bc06ea48dfee267a07a4ce834d7155766352930bcc65c34b98

    • SSDEEP

      98304:ZTEWU8jUj8sS/MZIZPP0G/tY1QWDIJbjRH5ux9fgAfBmRGUU3CF/5NCDNxX5EGVE:pUlIsGMZEP8G/tmQGyjRUx9hBmUeIFC1

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks