General

  • Target

    02357599.exe

  • Size

    3.5MB

  • Sample

    230531-hadxgadf9y

  • MD5

    a29004d57b0582196965b9344e0eb7b4

  • SHA1

    6e0ab8638b3559750dc40e4c23623552d84b5d8c

  • SHA256

    1a659b2d6922bd1ea186c53148094c26733368e9099ea037a83912c02a59d410

  • SHA512

    b097b10dcf833740b4bbd922a035c3658e51d8aeb6dd4f27ff1e8661da8c2ea47593e53b6400af5096943e6eebb27407c1c92b3ea2c10913150edad2f593b5b1

  • SSDEEP

    98304:XFXg7GTzJBVeXbdAWTUjpI5q05tzpMpKcvA0T:XFw7CzgXRAh9O4K5m

Malware Config

Targets

    • Target

      02357599.exe

    • Size

      3.5MB

    • MD5

      a29004d57b0582196965b9344e0eb7b4

    • SHA1

      6e0ab8638b3559750dc40e4c23623552d84b5d8c

    • SHA256

      1a659b2d6922bd1ea186c53148094c26733368e9099ea037a83912c02a59d410

    • SHA512

      b097b10dcf833740b4bbd922a035c3658e51d8aeb6dd4f27ff1e8661da8c2ea47593e53b6400af5096943e6eebb27407c1c92b3ea2c10913150edad2f593b5b1

    • SSDEEP

      98304:XFXg7GTzJBVeXbdAWTUjpI5q05tzpMpKcvA0T:XFw7CzgXRAh9O4K5m

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks