General

  • Target

    c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206

  • Size

    1.3MB

  • Sample

    230203-f4sllsef3y

  • MD5

    6435661990523418ffa1d4861ac7fc14

  • SHA1

    fbc38ecb7c6be72d72a095dc0d8d9948ae2562e1

  • SHA256

    c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206

  • SHA512

    ce53072d5b083b8b16653e875e700ced34960bcc4e92536a346ee9d32bda7e22f64256666034bc9088cb3e9ea2329570e8dff53324941098e4be1fb00e67bbff

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206

    • Size

      1.3MB

    • MD5

      6435661990523418ffa1d4861ac7fc14

    • SHA1

      fbc38ecb7c6be72d72a095dc0d8d9948ae2562e1

    • SHA256

      c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206

    • SHA512

      ce53072d5b083b8b16653e875e700ced34960bcc4e92536a346ee9d32bda7e22f64256666034bc9088cb3e9ea2329570e8dff53324941098e4be1fb00e67bbff

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks