General

  • Target

    c830d62f6f45993891816dee47dee340N.exe

  • Size

    1.7MB

  • Sample

    240721-qa36csteqp

  • MD5

    c830d62f6f45993891816dee47dee340

  • SHA1

    4284963ed30b687ccd47a2d69e6809e4290f0c78

  • SHA256

    2338d4f0154b4295202b61eafb9c5e457112de784325f6fc38a587be668024e3

  • SHA512

    d7870eca65c6b6b25b3f7dd788414afd64c075db9bdd1d8b099e932ab571449fe20126d5bde0bd3aaebd2c10ac4160c6ffee1899d8b2b37874f0a996af886fdc

  • SSDEEP

    24576:mwtlgjpoyMl1W9Rl/3XF9R95g9f53Lv+6gJUHGHhuf9QkGuW+4HcWb1JB4nS:BtyotW9RN+f53i1JUHG4xGuDkcY1JB

Malware Config

Targets

    • Target

      c830d62f6f45993891816dee47dee340N.exe

    • Size

      1.7MB

    • MD5

      c830d62f6f45993891816dee47dee340

    • SHA1

      4284963ed30b687ccd47a2d69e6809e4290f0c78

    • SHA256

      2338d4f0154b4295202b61eafb9c5e457112de784325f6fc38a587be668024e3

    • SHA512

      d7870eca65c6b6b25b3f7dd788414afd64c075db9bdd1d8b099e932ab571449fe20126d5bde0bd3aaebd2c10ac4160c6ffee1899d8b2b37874f0a996af886fdc

    • SSDEEP

      24576:mwtlgjpoyMl1W9Rl/3XF9R95g9f53Lv+6gJUHGHhuf9QkGuW+4HcWb1JB4nS:BtyotW9RN+f53i1JUHG4xGuDkcY1JB

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks