General

  • Target

    85397fd676a86cbf030d3abc21b602dd.exe

  • Size

    1.7MB

  • Sample

    230306-eym89sab31

  • MD5

    85397fd676a86cbf030d3abc21b602dd

  • SHA1

    6394b58e88a587eb164797a543c14922a0803768

  • SHA256

    b031e7786adbf73be86bcf7c89adac3cb4ff7034ec748872fd242c35d08a3468

  • SHA512

    9baee9d49aecb77ef7568562d2d802988e1382f783fda5d3f0a07d01f12e3722bcd548621e8ab9234a05f2e2767512d122db3da3e51fd15f7e10aac0ec01f6cc

  • SSDEEP

    49152:SMKDsLRSSjyA9mg8QMBahc/L2Ud4A/g+c:KMRS+95MBaGL2U2AA

Malware Config

Targets

    • Target

      85397fd676a86cbf030d3abc21b602dd.exe

    • Size

      1.7MB

    • MD5

      85397fd676a86cbf030d3abc21b602dd

    • SHA1

      6394b58e88a587eb164797a543c14922a0803768

    • SHA256

      b031e7786adbf73be86bcf7c89adac3cb4ff7034ec748872fd242c35d08a3468

    • SHA512

      9baee9d49aecb77ef7568562d2d802988e1382f783fda5d3f0a07d01f12e3722bcd548621e8ab9234a05f2e2767512d122db3da3e51fd15f7e10aac0ec01f6cc

    • SSDEEP

      49152:SMKDsLRSSjyA9mg8QMBahc/L2Ud4A/g+c:KMRS+95MBaGL2U2AA

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks