General

  • Target

    DarkLoader.exe

  • Size

    1.4MB

  • Sample

    240526-teaamabh4y

  • MD5

    2fa8b7d2efff94e2184a638f3858b4f1

  • SHA1

    b2e33ef6e39f8d74dcd636b78299868e6fd6c651

  • SHA256

    e717a0bd95ad8f0798d01d6cf0f10dcd18b162554d9555338a73b52a1db3e404

  • SHA512

    3af95a911f239e274d92883399225c61db9208701f3e950ecccad964acaebfce1abf8a484b09dfd25230961a5ebd80460a4259fa97c9a63d2973f8c5b6ddbd34

  • SSDEEP

    24576:i5ZWs+OZVEWry8AFy0twmtCiSC+1o9AxfAd0GIZ8x69Xx2base9KePqigGF:6ZB1G8Y3btCLC+1sAxfAzIZF9XxqaseH

Malware Config

Targets

    • Target

      DarkLoader.exe

    • Size

      1.4MB

    • MD5

      2fa8b7d2efff94e2184a638f3858b4f1

    • SHA1

      b2e33ef6e39f8d74dcd636b78299868e6fd6c651

    • SHA256

      e717a0bd95ad8f0798d01d6cf0f10dcd18b162554d9555338a73b52a1db3e404

    • SHA512

      3af95a911f239e274d92883399225c61db9208701f3e950ecccad964acaebfce1abf8a484b09dfd25230961a5ebd80460a4259fa97c9a63d2973f8c5b6ddbd34

    • SSDEEP

      24576:i5ZWs+OZVEWry8AFy0twmtCiSC+1o9AxfAd0GIZ8x69Xx2base9KePqigGF:6ZB1G8Y3btCLC+1sAxfAzIZF9XxqaseH

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks