General

  • Target

    13aeda86aafde4051d7ca9280dac9a67.bin

  • Size

    987KB

  • Sample

    240425-bdke4ace53

  • MD5

    b05cecf9b9ad589795971122d1b09e13

  • SHA1

    0d2920bbc56b3f17fd725e1c6d86ca7c38870b6c

  • SHA256

    00fbff74e62a2049c82198024aacf705b2d87aa55b3be4dc78d8547f4ed1e087

  • SHA512

    b476e00d4c0d1cb5553328e75ee1ac75342b43d0bcde3929c562f058a925ec195cb1960de6aad0a5bd11f78e28fa186c640c25966177089931791b153aa4ffa7

  • SSDEEP

    24576:Lhi/1npbxiHV2rdMLyerIJr7bJdhmUMhylmfgbRBdRq3Q3sfrf:Fs1n9a2hgIJHbJdhmhyljbPbcDf

Malware Config

Targets

    • Target

      01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.exe

    • Size

      1.4MB

    • MD5

      13aeda86aafde4051d7ca9280dac9a67

    • SHA1

      fd4a6168c79c28d6e25be7c799ffd25c2dbd69d0

    • SHA256

      01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111

    • SHA512

      ddfc9a2a5a2f3b83023eecf4053de1930ebf9486d1cff869ab6d2199c5978926b2c4a6468358c627f4cff16a235c8d23b98711d8b3bf608ed03f4e4d7d7d0194

    • SSDEEP

      24576:Lw/d/t+9SDGMoRNkj63uYnqzW1yqCc/CfVsdEYXHo1o9edFt4k:M/d/HP6+Ynb18Kfdx3IoIt

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks