General

  • Target

    51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02

  • Size

    2.1MB

  • Sample

    240313-x9s8rsea2v

  • MD5

    f4a675a3b47a85daa2e7905eba314760

  • SHA1

    0e01e07ff8ed4ca94a1dcad2f2af26fd8cf431ba

  • SHA256

    51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02

  • SHA512

    d8a9cd69392fc775cef5d714128ca08a39a6a111e57ff248b64ba4126b89bbff4ca39bb5c117450e405619cefbec7ca01ad931c6ae7d9cb14c6d1822d478152d

  • SSDEEP

    49152:D3B3BNkmneOg9/liOjsCpfAwq1jwaCJtn:zFBNkB9NiOjsC5A91jw5

Malware Config

Targets

    • Target

      51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02

    • Size

      2.1MB

    • MD5

      f4a675a3b47a85daa2e7905eba314760

    • SHA1

      0e01e07ff8ed4ca94a1dcad2f2af26fd8cf431ba

    • SHA256

      51b284bd1d8865e9d4fe9544c81882a7790a2ce32458249a25c9698329a0ea02

    • SHA512

      d8a9cd69392fc775cef5d714128ca08a39a6a111e57ff248b64ba4126b89bbff4ca39bb5c117450e405619cefbec7ca01ad931c6ae7d9cb14c6d1822d478152d

    • SSDEEP

      49152:D3B3BNkmneOg9/liOjsCpfAwq1jwaCJtn:zFBNkB9NiOjsC5A91jw5

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Detects executables packed with SmartAssembly

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks