General

  • Target

    a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7N

  • Size

    952KB

  • Sample

    241105-zxcrcsxqfy

  • MD5

    33070246887bc29db6b8b0a07808cc10

  • SHA1

    6f29033bd3d2f3be700b77c6bd40ffafd9888ac3

  • SHA256

    a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7

  • SHA512

    2f11ec5ad30c036437de720700f97f620b7e58b7eb3785e964f5b804931be8a9b9e1d0f776fe955cc1c8da1ab0719f485c4de91ce5af664c66a8a5b7e80ea587

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Targets

    • Target

      a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7N

    • Size

      952KB

    • MD5

      33070246887bc29db6b8b0a07808cc10

    • SHA1

      6f29033bd3d2f3be700b77c6bd40ffafd9888ac3

    • SHA256

      a444fc3ab26aefc4b10cdafa754b75d4677396f2ca92a4d670ee78f51c0e80e7

    • SHA512

      2f11ec5ad30c036437de720700f97f620b7e58b7eb3785e964f5b804931be8a9b9e1d0f776fe955cc1c8da1ab0719f485c4de91ce5af664c66a8a5b7e80ea587

    • SSDEEP

      24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks