General
-
Target
hz.exe
-
Size
2.0MB
-
Sample
241117-mywjmsydlj
-
MD5
4173ef9548c08b66a0b4b841ab91f475
-
SHA1
0054d308b9729cc7af0f8287b2786bc4246966c5
-
SHA256
5a3484f0aedd1a84750a5a3debf21a0f28efd20323ab55a0c89f622c27ebf9ad
-
SHA512
594c4b09fe60a3ebd4614f25632b720ecfe98ce6ae4476d81ab76f9ea8234cf3fc1b8ceae880646c2652e18983d7d9021cbc121f6da8f68edb74d9c0828cd3f3
-
SSDEEP
49152:UbA308AYvrxX9mR+5YEGXFhDRf9Q9mduSnp8zTu:UbxYvZ9mvXrRfmkduVTu
Malware Config
Targets
-
-
Target
hz.exe
-
Size
2.0MB
-
MD5
4173ef9548c08b66a0b4b841ab91f475
-
SHA1
0054d308b9729cc7af0f8287b2786bc4246966c5
-
SHA256
5a3484f0aedd1a84750a5a3debf21a0f28efd20323ab55a0c89f622c27ebf9ad
-
SHA512
594c4b09fe60a3ebd4614f25632b720ecfe98ce6ae4476d81ab76f9ea8234cf3fc1b8ceae880646c2652e18983d7d9021cbc121f6da8f68edb74d9c0828cd3f3
-
SSDEEP
49152:UbA308AYvrxX9mR+5YEGXFhDRf9Q9mduSnp8zTu:UbxYvZ9mvXrRfmkduVTu
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1