General

  • Target

    HEUR-Trojan-Spy.MSIL.Stealer.gen-4521deeecaaf.exe

  • Size

    1.3MB

  • Sample

    230201-wwfj3sbb75

  • MD5

    794ffd3f15df798c9e24967d5601fcbc

  • SHA1

    f601c2975a798b045aee9e68719b36ae8da01dae

  • SHA256

    4521deeecaaf651beb1282125e70cfe8deca459bd452781f55260988895b701a

  • SHA512

    b21990469cfe4313498a89debed5b3087b89acd860aff120b785048fe71cd4a5bcd56acc10314075eadf03645d608e23c11e8738901b8f805d4585e92d270392

  • SSDEEP

    24576:/PLoxXw1dpqthRHHyJVnZBAQcNDAjAQbCjO6F4//PeSh+4:D1LqtaPZ5G2C6E4H0

Malware Config

Targets

    • Target

      HEUR-Trojan-Spy.MSIL.Stealer.gen-4521deeecaaf.exe

    • Size

      1.3MB

    • MD5

      794ffd3f15df798c9e24967d5601fcbc

    • SHA1

      f601c2975a798b045aee9e68719b36ae8da01dae

    • SHA256

      4521deeecaaf651beb1282125e70cfe8deca459bd452781f55260988895b701a

    • SHA512

      b21990469cfe4313498a89debed5b3087b89acd860aff120b785048fe71cd4a5bcd56acc10314075eadf03645d608e23c11e8738901b8f805d4585e92d270392

    • SSDEEP

      24576:/PLoxXw1dpqthRHHyJVnZBAQcNDAjAQbCjO6F4//PeSh+4:D1LqtaPZ5G2C6E4H0

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks