General

  • Target

    79643de14cbcaa8418631f111829d949aa12077da33fd0981eb3ae56e1f570cb

  • Size

    1.4MB

  • Sample

    241015-e2m3nsyepn

  • MD5

    869d5f7ec4cb73ed019ca39fc6e7c232

  • SHA1

    7c666682e2e5051d4f9e33a6e04d8fd7882781d4

  • SHA256

    79643de14cbcaa8418631f111829d949aa12077da33fd0981eb3ae56e1f570cb

  • SHA512

    419bc13d2bec67948030f58e31103383d1bd6038a8ec8052e7196084fee9ba873832f60432d2a7bf953fddf3c461d05491cde4914d1373ba25309fcf57d84d03

  • SSDEEP

    24576:r5vEMO3wx7BGLfy/ysP4dDM+nKuiGw0Gu6j+TMK2SX644sSHwQLl5i0T:iT3wFB8sPInviG79g+YKrr4swho0T

Malware Config

Targets

    • Target

      79643de14cbcaa8418631f111829d949aa12077da33fd0981eb3ae56e1f570cb

    • Size

      1.4MB

    • MD5

      869d5f7ec4cb73ed019ca39fc6e7c232

    • SHA1

      7c666682e2e5051d4f9e33a6e04d8fd7882781d4

    • SHA256

      79643de14cbcaa8418631f111829d949aa12077da33fd0981eb3ae56e1f570cb

    • SHA512

      419bc13d2bec67948030f58e31103383d1bd6038a8ec8052e7196084fee9ba873832f60432d2a7bf953fddf3c461d05491cde4914d1373ba25309fcf57d84d03

    • SSDEEP

      24576:r5vEMO3wx7BGLfy/ysP4dDM+nKuiGw0Gu6j+TMK2SX644sSHwQLl5i0T:iT3wFB8sPInviG79g+YKrr4swho0T

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks