General

  • Target

    119a68034c34af185b41be35067f1851.bin

  • Size

    1.5MB

  • Sample

    240531-bg6gqshb4z

  • MD5

    ad28d44bd1c79380eb88ca4500f2e5c7

  • SHA1

    73bfa5e050e46c13bd37944abae5721c2886e2c9

  • SHA256

    63121c87674d1595843da240dc1bde6d8a96a13a88abb4d19f58191296a75ede

  • SHA512

    c8977839ab0b20ae881f32fa7b25a5020d77d994d9ddd35778b9c06108d996c31083e30339907ca6c8e9dfd374faecb417c741fe0c9ccf970a3170d6d285fc43

  • SSDEEP

    49152:50C1FPhsJ6X+OOMpp6CMTjouaGFZsjO2fFv0O:50GFPqgVzMT0mmdF

Malware Config

Targets

    • Target

      88ca97ed664243845afb3693bcbe5150e3628039e34f99b49df865442b60b4f1.exe

    • Size

      1.9MB

    • MD5

      119a68034c34af185b41be35067f1851

    • SHA1

      f2db018a4c5e7f18ca1b8eab1090c6e495079e9f

    • SHA256

      88ca97ed664243845afb3693bcbe5150e3628039e34f99b49df865442b60b4f1

    • SHA512

      fe22b2dfa5f75720da287433572f8803b46ec0a8d90b7acce12406ea6bcb4e35b9a41456398b0b64bb5571a869cc7135d9aeaf747d948348033a109714b6ac49

    • SSDEEP

      24576:ZcIqg3pZ9Lbp1x5mMnbJ4ANfUAlkDd/2uUpET57RLGKETv/cyUM6MniOlsxvZBSg:3rhDbJ4dAlkpuuUpY57cKEr0a7iOyKc

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks