General

  • Target

    DCRatBuild_protected.sfx.exe

  • Size

    2.3MB

  • Sample

    240619-t51v9stdrf

  • MD5

    442a5dbe203bf1dfe043c44a45df38b6

  • SHA1

    2d06e45186f6856e02644ab8550b85469a84afbc

  • SHA256

    3c2e56fa690da037a3fa6e5aca8864a15c9a402103f7db8387dff08d5ebeb217

  • SHA512

    320237df5d3101ab4925eb875198a21a341da2cb176af2f0dc7f51c3952bbedb83f473d47730f6d2b989ee3e4ce659ceee5fec6263476b2d61fa1569f95d9a79

  • SSDEEP

    49152:lOtT5572ZjEpnO4YfjTYj5IcgIvN5Q/7D3X+f4K1S38B2EHV3X:lOtTbnpufjU2NIDQzDHyh1dMEHV3X

Malware Config

Targets

    • Target

      DCRatBuild_protected.sfx.exe

    • Size

      2.3MB

    • MD5

      442a5dbe203bf1dfe043c44a45df38b6

    • SHA1

      2d06e45186f6856e02644ab8550b85469a84afbc

    • SHA256

      3c2e56fa690da037a3fa6e5aca8864a15c9a402103f7db8387dff08d5ebeb217

    • SHA512

      320237df5d3101ab4925eb875198a21a341da2cb176af2f0dc7f51c3952bbedb83f473d47730f6d2b989ee3e4ce659ceee5fec6263476b2d61fa1569f95d9a79

    • SSDEEP

      49152:lOtT5572ZjEpnO4YfjTYj5IcgIvN5Q/7D3X+f4K1S38B2EHV3X:lOtTbnpufjU2NIDQzDHyh1dMEHV3X

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks