General

  • Target

    951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba

  • Size

    2.0MB

  • Sample

    240517-b2v7habc8z

  • MD5

    7a92d788bf63e3e0446c25e4b7dd3f9a

  • SHA1

    482860a3d765b91779840f3510690a4130fcfdc4

  • SHA256

    951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba

  • SHA512

    171d61faaa7812c4045d6a552a4e166786ab2c11cd89ac89adcc545a2222e0c81e880de4b4eba2118f0df5716ab54591c84ab852bd47f9bc57f6b26dd1eb034a

  • SSDEEP

    24576:kn2XTCHM4xT9V3XzsHhVmatCELYIXVelAtgbHHd:SaTUv0jmtEttc

Malware Config

Targets

    • Target

      951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba

    • Size

      2.0MB

    • MD5

      7a92d788bf63e3e0446c25e4b7dd3f9a

    • SHA1

      482860a3d765b91779840f3510690a4130fcfdc4

    • SHA256

      951ad9f829662e6fb80e7a1b8f4eaa3de47c225388b26d3bd19d05c54d2f9eba

    • SHA512

      171d61faaa7812c4045d6a552a4e166786ab2c11cd89ac89adcc545a2222e0c81e880de4b4eba2118f0df5716ab54591c84ab852bd47f9bc57f6b26dd1eb034a

    • SSDEEP

      24576:kn2XTCHM4xT9V3XzsHhVmatCELYIXVelAtgbHHd:SaTUv0jmtEttc

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Detects executables containing bas64 encoded gzip files

    • Detects executables packed with SmartAssembly

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks