General

  • Target

    892555689233c21dfdfc0fb10a8241b92d36dd7b2831b28331b2efb6b219fd66

  • Size

    382KB

  • Sample

    230129-y65casde41

  • MD5

    e341dce8ea14c62cdb2c2a0082c06e6f

  • SHA1

    40e13801d6e48317eac0019a5d69b5385afe4cd7

  • SHA256

    892555689233c21dfdfc0fb10a8241b92d36dd7b2831b28331b2efb6b219fd66

  • SHA512

    d9722cea91e6d4268b4b799c33022978eef8a70f5fb8056b13c60ca2fbe5772423141f94e7ef58095fc49eefb6e0a217a11903e7d23d0c9e8838502225d07b69

  • SSDEEP

    6144:Nhg8RILt0ndjMKoeHUSI8zNqjFNa4Xn2J+TiqqDL:NZndjZVVwk5J0Xqn

Malware Config

Targets

    • Target

      892555689233c21dfdfc0fb10a8241b92d36dd7b2831b28331b2efb6b219fd66

    • Size

      382KB

    • MD5

      e341dce8ea14c62cdb2c2a0082c06e6f

    • SHA1

      40e13801d6e48317eac0019a5d69b5385afe4cd7

    • SHA256

      892555689233c21dfdfc0fb10a8241b92d36dd7b2831b28331b2efb6b219fd66

    • SHA512

      d9722cea91e6d4268b4b799c33022978eef8a70f5fb8056b13c60ca2fbe5772423141f94e7ef58095fc49eefb6e0a217a11903e7d23d0c9e8838502225d07b69

    • SSDEEP

      6144:Nhg8RILt0ndjMKoeHUSI8zNqjFNa4Xn2J+TiqqDL:NZndjZVVwk5J0Xqn

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks