General

  • Target

    SolaraBootstrapper.exe

  • Size

    2.1MB

  • Sample

    241111-n24vvssmap

  • MD5

    46ee914172c6a86f6545e8afdcbddb60

  • SHA1

    1e40ed9b6d1f8f24b9692c4b600a04a0fabac121

  • SHA256

    c2fc34d4e0c21d93bb27de86004031c5d6a7aa359f3b9c511d6a771df9d8bec0

  • SHA512

    55025faa2d309fc959d07573273559ea3007d8bcf4242417d81965678638ee27a3465be96ce21ee3398edc84dc2d385237a8a1845d037802ddab4be8421f28dd

  • SSDEEP

    24576:lTbBv5rUfSyHO85Zn6VSnaS/6fRkJ9v82URnpQKm+9nHjLJAWCNGQj1EHzpp4o5R:PBZ076i7v8ZjQ6PJAWCNFp0zpphFaF4

Malware Config

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      2.1MB

    • MD5

      46ee914172c6a86f6545e8afdcbddb60

    • SHA1

      1e40ed9b6d1f8f24b9692c4b600a04a0fabac121

    • SHA256

      c2fc34d4e0c21d93bb27de86004031c5d6a7aa359f3b9c511d6a771df9d8bec0

    • SHA512

      55025faa2d309fc959d07573273559ea3007d8bcf4242417d81965678638ee27a3465be96ce21ee3398edc84dc2d385237a8a1845d037802ddab4be8421f28dd

    • SSDEEP

      24576:lTbBv5rUfSyHO85Zn6VSnaS/6fRkJ9v82URnpQKm+9nHjLJAWCNGQj1EHzpp4o5R:PBZ076i7v8ZjQ6PJAWCNFp0zpphFaF4

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks