General

  • Target

    09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694.exe

  • Size

    3.3MB

  • Sample

    240726-bsa5zaxdql

  • MD5

    bc2d438a68d814ce5df1af0dd02ada11

  • SHA1

    fc029395beb053a35f3a3dbaefd22a7e5235360a

  • SHA256

    09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694

  • SHA512

    a87043218f4dd403990ce02c7b5aa6f62adcba3046eb67bb50db477cd8d7ad4ec2875ff165a04fe5e0798f7a687ee144fbc80aa8a7f175f287b06b931552298d

  • SSDEEP

    49152:o8xhCcpCNPulYCFckZHvEdM1jegx7oOCM1Gn72tESduILWMJd33eRkX2EuFgtDGg:NhrChV+cU/NeBPMY72tRR0EuUG

Malware Config

Targets

    • Target

      09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694.exe

    • Size

      3.3MB

    • MD5

      bc2d438a68d814ce5df1af0dd02ada11

    • SHA1

      fc029395beb053a35f3a3dbaefd22a7e5235360a

    • SHA256

      09c0c134cbc01a50cc2f9c05504480cb2e1f1a0139d3372e6fe0a22aeff4c694

    • SHA512

      a87043218f4dd403990ce02c7b5aa6f62adcba3046eb67bb50db477cd8d7ad4ec2875ff165a04fe5e0798f7a687ee144fbc80aa8a7f175f287b06b931552298d

    • SSDEEP

      49152:o8xhCcpCNPulYCFckZHvEdM1jegx7oOCM1Gn72tESduILWMJd33eRkX2EuFgtDGg:NhrChV+cU/NeBPMY72tRR0EuUG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks