General

  • Target

    e8f1e825cd1da794257a8f1f38f291835b31d45ded1cace17953b4a4f3bbf040

  • Size

    61KB

  • Sample

    240530-ltbs1aed98

  • MD5

    1ce13e423f57888a68c3c544460b13a4

  • SHA1

    eb98c3220428ea3e5bf391f330af1317c839d258

  • SHA256

    e8f1e825cd1da794257a8f1f38f291835b31d45ded1cace17953b4a4f3bbf040

  • SHA512

    eb0da239fec584754fc720b50cd1668684e4eadbe86f267b6285806c79c045fa657aaf9e97c8e27c967207105180251c5e13b7eb213fa067ad301d4af316accb

  • SSDEEP

    768:5vcc1E6Deh+l8qctQuC4jCqD1uu2wZy1PNQF1DCVTs85ECgm8Azet8AtZ:dCh+Oqmq/p1PqF1DCNs+EXAzeyAtZ

Malware Config

Targets

    • Target

      e8f1e825cd1da794257a8f1f38f291835b31d45ded1cace17953b4a4f3bbf040

    • Size

      61KB

    • MD5

      1ce13e423f57888a68c3c544460b13a4

    • SHA1

      eb98c3220428ea3e5bf391f330af1317c839d258

    • SHA256

      e8f1e825cd1da794257a8f1f38f291835b31d45ded1cace17953b4a4f3bbf040

    • SHA512

      eb0da239fec584754fc720b50cd1668684e4eadbe86f267b6285806c79c045fa657aaf9e97c8e27c967207105180251c5e13b7eb213fa067ad301d4af316accb

    • SSDEEP

      768:5vcc1E6Deh+l8qctQuC4jCqD1uu2wZy1PNQF1DCVTs85ECgm8Azet8AtZ:dCh+Oqmq/p1PqF1DCNs+EXAzeyAtZ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks