General

  • Target

    HEUR-Trojan-Spy.MSIL.Stealer.gen-5caa9414d268.exe

  • Size

    579KB

  • Sample

    230202-abftfsfd6w

  • MD5

    a5bb468e6bb248387e71ff2692106d47

  • SHA1

    c673a5f6bee9ad99068a43455fac19cb4ffb948b

  • SHA256

    5caa9414d268c408b9a82f4442a87efa2f7f4058d44de616a17da6c5ab113bc3

  • SHA512

    fd8bdbb071ab7191ade1b19af740ceefd3743effa69c265a51bd98508aa62b73217e6fc99f19b09bd75d5403d71370a73575dd7fad3a9d1c679d0a1d7f3e743e

  • SSDEEP

    12288:fqnOpfdSL1NYAm/4q2CHeVlnJo2JEHE5rGtK3:f+OpfdCYAzq2VVQ2JEklGt8

Malware Config

Targets

    • Target

      HEUR-Trojan-Spy.MSIL.Stealer.gen-5caa9414d268.exe

    • Size

      579KB

    • MD5

      a5bb468e6bb248387e71ff2692106d47

    • SHA1

      c673a5f6bee9ad99068a43455fac19cb4ffb948b

    • SHA256

      5caa9414d268c408b9a82f4442a87efa2f7f4058d44de616a17da6c5ab113bc3

    • SHA512

      fd8bdbb071ab7191ade1b19af740ceefd3743effa69c265a51bd98508aa62b73217e6fc99f19b09bd75d5403d71370a73575dd7fad3a9d1c679d0a1d7f3e743e

    • SSDEEP

      12288:fqnOpfdSL1NYAm/4q2CHeVlnJo2JEHE5rGtK3:f+OpfdCYAzq2VVQ2JEklGt8

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks