General

  • Target

    FixedBootstrapper1.exe

  • Size

    4.8MB

  • Sample

    241116-wf31fa1clk

  • MD5

    12d7d6f7372db4da1e1242bd2efc8ae8

  • SHA1

    fcde71dec007c4ad3656eb9ab2ff9d4a066e6f1b

  • SHA256

    e4d875f0cbd3ec785d08862382e4c139496d78d54daf985e78a54883ef0fa8dd

  • SHA512

    d07ce82badc014650a0464daa1a315dc6a51be4b3495738c9be0c08f81980f37e6d6b8baed32eb6227bee9a4c062a87f582b0333391ef59b413ef62ae1b6b777

  • SSDEEP

    98304:0xsTP26lnPgfjAyAzffPJFSZ0kZP2avl16aEQFluJvY/b0xtR:0xsTuoPgfVAznPkb3VLalY/bi

Malware Config

Targets

    • Target

      FixedBootstrapper1.exe

    • Size

      4.8MB

    • MD5

      12d7d6f7372db4da1e1242bd2efc8ae8

    • SHA1

      fcde71dec007c4ad3656eb9ab2ff9d4a066e6f1b

    • SHA256

      e4d875f0cbd3ec785d08862382e4c139496d78d54daf985e78a54883ef0fa8dd

    • SHA512

      d07ce82badc014650a0464daa1a315dc6a51be4b3495738c9be0c08f81980f37e6d6b8baed32eb6227bee9a4c062a87f582b0333391ef59b413ef62ae1b6b777

    • SSDEEP

      98304:0xsTP26lnPgfjAyAzffPJFSZ0kZP2avl16aEQFluJvY/b0xtR:0xsTuoPgfVAznPkb3VLalY/bi

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks