General

  • Target

    ad372edd698062a90f4744da16f88cc5bb45ca9b1cb70fc7350673d293f2bc16

  • Size

    825KB

  • Sample

    241030-d1bskstrey

  • MD5

    ce09db6adeeca051ff01abd8cf2e400d

  • SHA1

    14e60e202c180152757a89d13d9989ec35e1f5a2

  • SHA256

    ad372edd698062a90f4744da16f88cc5bb45ca9b1cb70fc7350673d293f2bc16

  • SHA512

    e80449cde93d19790e64c1fe24af1aeb00a3c392b4d57a529205a2339bbaa675b6ee21d2d068d65ef21c37d23d2f1b8b458706068ffe850410dc290c4d5c0ce3

  • SSDEEP

    12288:jVTnKIxG7yLfHB7cymJJMA+bpW3Ari4VVyZC0+1cw2jINofMVbZZ6:jVTney9cyQJMA+b3iE0nHA6

Malware Config

Targets

    • Target

      ad372edd698062a90f4744da16f88cc5bb45ca9b1cb70fc7350673d293f2bc16

    • Size

      825KB

    • MD5

      ce09db6adeeca051ff01abd8cf2e400d

    • SHA1

      14e60e202c180152757a89d13d9989ec35e1f5a2

    • SHA256

      ad372edd698062a90f4744da16f88cc5bb45ca9b1cb70fc7350673d293f2bc16

    • SHA512

      e80449cde93d19790e64c1fe24af1aeb00a3c392b4d57a529205a2339bbaa675b6ee21d2d068d65ef21c37d23d2f1b8b458706068ffe850410dc290c4d5c0ce3

    • SSDEEP

      12288:jVTnKIxG7yLfHB7cymJJMA+bpW3Ari4VVyZC0+1cw2jINofMVbZZ6:jVTney9cyQJMA+b3iE0nHA6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks