General

  • Target

    1aeaabc57a89dd8508a5e997236b91b3cd7e584dad94700fcad9d8637d2b926d.exe

  • Size

    631KB

  • Sample

    241108-cpsfhsshqm

  • MD5

    4d95ea8721d0a84b69c2d60951a8a65e

  • SHA1

    b3b9230b284c32e8d35c65b6b31d0a1b729c6d7c

  • SHA256

    1aeaabc57a89dd8508a5e997236b91b3cd7e584dad94700fcad9d8637d2b926d

  • SHA512

    7500b73aa452a6452fd6fe41df0fbffa96821918df34fcff2a29bf2072f5fdb02886fa0945f5d567fefcf30de6d042b4e17e6760bb5e5a3ceba11767316c3fee

  • SSDEEP

    12288:Cr2N7ewZcHjHkoP19jpVgUbdxGU2NjCa8UQGqIJ7uHXNI8W2Zx:Cr2EEypVg4x8NmtjS+

Malware Config

Targets

    • Target

      1aeaabc57a89dd8508a5e997236b91b3cd7e584dad94700fcad9d8637d2b926d.exe

    • Size

      631KB

    • MD5

      4d95ea8721d0a84b69c2d60951a8a65e

    • SHA1

      b3b9230b284c32e8d35c65b6b31d0a1b729c6d7c

    • SHA256

      1aeaabc57a89dd8508a5e997236b91b3cd7e584dad94700fcad9d8637d2b926d

    • SHA512

      7500b73aa452a6452fd6fe41df0fbffa96821918df34fcff2a29bf2072f5fdb02886fa0945f5d567fefcf30de6d042b4e17e6760bb5e5a3ceba11767316c3fee

    • SSDEEP

      12288:Cr2N7ewZcHjHkoP19jpVgUbdxGU2NjCa8UQGqIJ7uHXNI8W2Zx:Cr2EEypVg4x8NmtjS+

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks