General

  • Target

    Internity.exe

  • Size

    3.0MB

  • Sample

    240429-dpby7sgf8w

  • MD5

    febcc879d59c292f59bfc248b0b65fae

  • SHA1

    ffcefa2e7d588b2bd13d62b0f5057bb6c47c31ba

  • SHA256

    c1e710ae05fc907abee1111868b4fc857f46964ed8815a9681043af01743afec

  • SHA512

    59a2fecff8c31d63ddaf29b13c5ab6b8061831d211808983035af83a11390bf6630e0f4a6ba8319cfd42684c5818d3004a784526e4abd44e75933ff2ffaf6ca7

  • SSDEEP

    98304:EbICoU2eUgjtvpktfZxlyANWWGX4f4dNb:EsGSgRvpkt8JdF

Malware Config

Targets

    • Target

      Internity.exe

    • Size

      3.0MB

    • MD5

      febcc879d59c292f59bfc248b0b65fae

    • SHA1

      ffcefa2e7d588b2bd13d62b0f5057bb6c47c31ba

    • SHA256

      c1e710ae05fc907abee1111868b4fc857f46964ed8815a9681043af01743afec

    • SHA512

      59a2fecff8c31d63ddaf29b13c5ab6b8061831d211808983035af83a11390bf6630e0f4a6ba8319cfd42684c5818d3004a784526e4abd44e75933ff2ffaf6ca7

    • SSDEEP

      98304:EbICoU2eUgjtvpktfZxlyANWWGX4f4dNb:EsGSgRvpkt8JdF

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Command and Scripting Interpreter

1
T1059

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

3
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Discovery

Query Registry

4
T1012

System Information Discovery

6
T1082

Tasks