General

  • Target

    HEUR-Trojan.Win32.Generic-7fe5834f29daabc2f00.exe

  • Size

    1.5MB

  • Sample

    230202-mxtcwsfg95

  • MD5

    c532d809990659da1bc427ad039a7d5c

  • SHA1

    6158717c914aea611074a14fd0527663e95ccb64

  • SHA256

    7fe5834f29daabc2f0034eff990a5dcadccdbbad7a6428eea416322020f2afef

  • SHA512

    b70d7d8f646d5bb1bb1a7bbd787c16647448d00291ed231b79e2193237d3ac1d00d584873cadccfea1a7494648a1c9050a056f42ce8d434a8b5318d4f2371d63

  • SSDEEP

    12288:CC6105US81giZG7/N8vzvD//dH1P2TZeQmrD0:TUS813T

Malware Config

Targets

    • Target

      HEUR-Trojan.Win32.Generic-7fe5834f29daabc2f00.exe

    • Size

      1.5MB

    • MD5

      c532d809990659da1bc427ad039a7d5c

    • SHA1

      6158717c914aea611074a14fd0527663e95ccb64

    • SHA256

      7fe5834f29daabc2f0034eff990a5dcadccdbbad7a6428eea416322020f2afef

    • SHA512

      b70d7d8f646d5bb1bb1a7bbd787c16647448d00291ed231b79e2193237d3ac1d00d584873cadccfea1a7494648a1c9050a056f42ce8d434a8b5318d4f2371d63

    • SSDEEP

      12288:CC6105US81giZG7/N8vzvD//dH1P2TZeQmrD0:TUS813T

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks