General

  • Target

    Nursultan Alpha.exe

  • Size

    1.8MB

  • Sample

    241115-21mf3svbmk

  • MD5

    a0645e34ac6cb9437068b77b866359d3

  • SHA1

    18336dcb1df21c059424ab7a39fda24917ed17db

  • SHA256

    be0eac22d3c922d2b394a32b3bb0721c27f0fe1fbfa8c062db3c81b8b9d57fea

  • SHA512

    07340cc1d83997031bf20831a1f01700fbce98a294d8135cd4aa4c3d5f43b035faaee9a6c127766e802e018c98835358be268f3aac24a84a82317510c87a4968

  • SSDEEP

    24576:HTbBv5rUr3617t7ROjwJqMAVS2hEijP79eAPkavlCCyYcBoZ11q8UuZPt5PsuWy:BBw6Bt7R0wJ4L5Uw5lCCyG31oIPmy

Malware Config

Targets

    • Target

      Nursultan Alpha.exe

    • Size

      1.8MB

    • MD5

      a0645e34ac6cb9437068b77b866359d3

    • SHA1

      18336dcb1df21c059424ab7a39fda24917ed17db

    • SHA256

      be0eac22d3c922d2b394a32b3bb0721c27f0fe1fbfa8c062db3c81b8b9d57fea

    • SHA512

      07340cc1d83997031bf20831a1f01700fbce98a294d8135cd4aa4c3d5f43b035faaee9a6c127766e802e018c98835358be268f3aac24a84a82317510c87a4968

    • SSDEEP

      24576:HTbBv5rUr3617t7ROjwJqMAVS2hEijP79eAPkavlCCyYcBoZ11q8UuZPt5PsuWy:BBw6Bt7R0wJ4L5Uw5lCCyG31oIPmy

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks