General

  • Target

    2e18c0635a5593a2959b9a7c47d1145dd7115142013e4b0d6b4f931e63590fd6

  • Size

    1.2MB

  • Sample

    241105-zvd7ea1mbn

  • MD5

    477211148933cc41d67087078f70cd58

  • SHA1

    3a931ffa7e536bd381c5fb46ebb5fd93b05bb2ec

  • SHA256

    2e18c0635a5593a2959b9a7c47d1145dd7115142013e4b0d6b4f931e63590fd6

  • SHA512

    76396f20ca86c749a14510c8ae2ab03042867127956e1aacc5765c933471e1987b759122f2d90c1b87392d26e12329519dfac8b0a19692c0ec07288190a91cda

  • SSDEEP

    24576:bJlmUJyTmqFOGfeRIvZ6+adOSMZgrWoIaWrcX:OvU+a/rSro

Malware Config

Targets

    • Target

      2e18c0635a5593a2959b9a7c47d1145dd7115142013e4b0d6b4f931e63590fd6

    • Size

      1.2MB

    • MD5

      477211148933cc41d67087078f70cd58

    • SHA1

      3a931ffa7e536bd381c5fb46ebb5fd93b05bb2ec

    • SHA256

      2e18c0635a5593a2959b9a7c47d1145dd7115142013e4b0d6b4f931e63590fd6

    • SHA512

      76396f20ca86c749a14510c8ae2ab03042867127956e1aacc5765c933471e1987b759122f2d90c1b87392d26e12329519dfac8b0a19692c0ec07288190a91cda

    • SSDEEP

      24576:bJlmUJyTmqFOGfeRIvZ6+adOSMZgrWoIaWrcX:OvU+a/rSro

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks