General

  • Target

    097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de

  • Size

    952KB

  • Sample

    241107-yax84sxfqp

  • MD5

    80fd1427a8a08ad8f16a5a091d3080d5

  • SHA1

    16e6e7fdec42cdb1216c1ec28a3760135f6b5e1f

  • SHA256

    097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de

  • SHA512

    8f321556d6b2cc8a5605e928534d29034587de4af47df149153fa9f636c56afb730a55a1ad01f491d531c4315bc31aefadd09462257478416636b9aba8672612

  • SSDEEP

    24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK

Malware Config

Targets

    • Target

      097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de

    • Size

      952KB

    • MD5

      80fd1427a8a08ad8f16a5a091d3080d5

    • SHA1

      16e6e7fdec42cdb1216c1ec28a3760135f6b5e1f

    • SHA256

      097054f17509ff1370a6954f8d69c873d8013a9d8439cc623545d583f4b263de

    • SHA512

      8f321556d6b2cc8a5605e928534d29034587de4af47df149153fa9f636c56afb730a55a1ad01f491d531c4315bc31aefadd09462257478416636b9aba8672612

    • SSDEEP

      24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks