General

  • Target

    9781aaa439fcf85da08d40c5c3e3909f.bin

  • Size

    2.5MB

  • Sample

    230328-chqcksac5w

  • MD5

    450531c541775a4a7c745c3b66688fe5

  • SHA1

    73db0b6751338ac3aaea893c9901fe1b0d6f4c65

  • SHA256

    71599c34f4bed1f26c86cbfe2f1bdffe2cfc1344e770d9228ce8bc38482d598e

  • SHA512

    f166f3de276aeacde520fd972dacaf94d0ac831bd20b4b864f2b29d8829b84addb25e1b46d1991b49dcd808b931836a86e45ec54f3ae2789e99dfe50d68abd6c

  • SSDEEP

    49152:ydLTMV6O4wHROXhDMwaq13zn/CR7BB8R9Fkljhy9rnyfjZ:6LTU6NeROXmp+Dn/CRDs9uljhy9rybZ

Malware Config

Targets

    • Target

      413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35.exe

    • Size

      2.9MB

    • MD5

      9781aaa439fcf85da08d40c5c3e3909f

    • SHA1

      edd84aae94017cdde7dd564d2791c6389f98c01f

    • SHA256

      413e93938387abf6009f38e415cdbb6d2c800a4a163cd3987c68bee89d432f35

    • SHA512

      27be25ed8a4df487bbb3066a9d67ee8403cb91ec8f21aeb2367252c57cf209903f01f770394f6e9d05e627a7697a9ba446bea98f65f5be166f7be33c74dedd02

    • SSDEEP

      49152:VVqaWggE8cLbTM0Qpx80y5tq4JyiK+RzzO/twfoLFAq4JNpFLP7:zqLggl0QpC0qt/JyV+hz5foLB4Jn

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks