General

  • Target

    WEXTRACT.EXE

  • Size

    7.2MB

  • Sample

    230201-ywwx6sbg69

  • MD5

    1031f7f6ee923fa952dbe18807039570

  • SHA1

    01a144e221c3a67b4bdc2ad3662a682b66d4dd4a

  • SHA256

    24277b308f5f5d2154a648564965df5153921a2b66e3766223732f7f9cfeaca8

  • SHA512

    86abaa547484b599039502e04c0be7da1aae396d4d736f6ab79585b8d0bbb4a36704b9c23db6ec7dbedd8323b6baa07f129afb851dce15d21ae85350d03ea491

  • SSDEEP

    196608:pbZpm896G7CCcWhF4Ps71GyFoQRC79BHDTZ:plp+Ps7wyF3gBBnZ

Malware Config

Targets

    • Target

      WEXTRACT.EXE

    • Size

      7.2MB

    • MD5

      1031f7f6ee923fa952dbe18807039570

    • SHA1

      01a144e221c3a67b4bdc2ad3662a682b66d4dd4a

    • SHA256

      24277b308f5f5d2154a648564965df5153921a2b66e3766223732f7f9cfeaca8

    • SHA512

      86abaa547484b599039502e04c0be7da1aae396d4d736f6ab79585b8d0bbb4a36704b9c23db6ec7dbedd8323b6baa07f129afb851dce15d21ae85350d03ea491

    • SSDEEP

      196608:pbZpm896G7CCcWhF4Ps71GyFoQRC79BHDTZ:plp+Ps7wyF3gBBnZ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies boot configuration data using bcdedit

MITRE ATT&CK Enterprise v6

Tasks