General

  • Target

    pwxz driver + km.exe

  • Size

    1.1MB

  • Sample

    241108-n8e53svjdm

  • MD5

    f98e6472238ac5d8686545a0d48d176b

  • SHA1

    927fa5aff827297e7bbc991b6bc573f4cf6d9945

  • SHA256

    b4378b93df9c53cfb65f83695e4a68c3eceb87c49eef02ee45b85128f967e381

  • SHA512

    231b45a7c636a5d8dc6a805d7a9da61308f159540b74796e8a11329fe90ed0f72ad88e5104781156f1ff36403b1bb131e83030fef2e37cf9c139d32194d5817e

  • SSDEEP

    24576:jfANwLwUvInQgVXu9QdasS+9zxocWbnw0GcV73Fd:jfYwSnZAQdasS+Ecod

Malware Config

Targets

    • Target

      pwxz driver + km.exe

    • Size

      1.1MB

    • MD5

      f98e6472238ac5d8686545a0d48d176b

    • SHA1

      927fa5aff827297e7bbc991b6bc573f4cf6d9945

    • SHA256

      b4378b93df9c53cfb65f83695e4a68c3eceb87c49eef02ee45b85128f967e381

    • SHA512

      231b45a7c636a5d8dc6a805d7a9da61308f159540b74796e8a11329fe90ed0f72ad88e5104781156f1ff36403b1bb131e83030fef2e37cf9c139d32194d5817e

    • SSDEEP

      24576:jfANwLwUvInQgVXu9QdasS+9zxocWbnw0GcV73Fd:jfYwSnZAQdasS+Ecod

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks