General

  • Target

    9781aaa439fcf85da08d40c5c3e3909f.exe

  • Size

    2.9MB

  • Sample

    230326-zkafgabh9s

  • MD5

    9781aaa439fcf85da08d40c5c3e3909f

  • SHA1

    edd84aae94017cdde7dd564d2791c6389f98c01f

  • SHA256

    413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35

  • SHA512

    27be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02

  • SSDEEP

    49152:VVqaWggE8cLbTM0Qpx80y5tq4JyiK+RzzO/twfoLFAq4JNpFLP7:zqLggl0QpC0qt/JyV+hz5foLB4Jn

Malware Config

Targets

    • Target

      9781aaa439fcf85da08d40c5c3e3909f.exe

    • Size

      2.9MB

    • MD5

      9781aaa439fcf85da08d40c5c3e3909f

    • SHA1

      edd84aae94017cdde7dd564d2791c6389f98c01f

    • SHA256

      413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35

    • SHA512

      27be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02

    • SSDEEP

      49152:VVqaWggE8cLbTM0Qpx80y5tq4JyiK+RzzO/twfoLFAq4JNpFLP7:zqLggl0QpC0qt/JyV+hz5foLB4Jn

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks