General
-
Target
bot.exe
-
Size
3.2MB
-
Sample
241103-zr95nstlcx
-
MD5
d9f7208d0116dcde22ece5048ac6c37d
-
SHA1
f9b23d695bb875f032292983fe537c48bc02a657
-
SHA256
15ba1de7e069b6615cc13a43cc2b50426065e92e018066b0e3a3af43bba522ee
-
SHA512
152289834cfcf4fc78bd0799a78752587b06dd1c839ee46e050a03c99e1d527de995bd9430fbaee6da3d999293f00dbaa1d07736137e08c7740d5edb7263b114
-
SSDEEP
49152:ubA3j4Ovfe+uuyV5rPOf82wtPXbGuTVHXZiyF3U5zKY7SeVZ9:ubSvfmV5kjwVbLXq5zKY9VZ9
Malware Config
Targets
-
-
Target
bot.exe
-
Size
3.2MB
-
MD5
d9f7208d0116dcde22ece5048ac6c37d
-
SHA1
f9b23d695bb875f032292983fe537c48bc02a657
-
SHA256
15ba1de7e069b6615cc13a43cc2b50426065e92e018066b0e3a3af43bba522ee
-
SHA512
152289834cfcf4fc78bd0799a78752587b06dd1c839ee46e050a03c99e1d527de995bd9430fbaee6da3d999293f00dbaa1d07736137e08c7740d5edb7263b114
-
SSDEEP
49152:ubA3j4Ovfe+uuyV5rPOf82wtPXbGuTVHXZiyF3U5zKY7SeVZ9:ubSvfmV5kjwVbLXq5zKY9VZ9
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1