General

  • Target

    Exloader_Installer1.exe

  • Size

    27.5MB

  • Sample

    241119-tkhtysyepr

  • MD5

    8feb32f1c24e913222ffe6245ea49e86

  • SHA1

    fb93436b7c32bddfb807fcbf07a4434b7bf79a3d

  • SHA256

    7c6a80e93e96d417b7eaf9260c5a645d8d45e4c6cf420dcaf482fd480e80ad4e

  • SHA512

    7b75d76bc079e0fd3acf56cc569bfeac5fd3fb180844b243235c5ca04e53b9f96182c087531919f9437b3d9bd857d1678cea4476812b88b95f54bd56ec0c6b9c

  • SSDEEP

    786432:qHkEWCyHVn1sF4Bw7XqjBk2LZNopfjZqGWHeQZqQ6:qERKFpXqxqf1qGMenQ6

Malware Config

Targets

    • Target

      Exloader_Installer1.exe

    • Size

      27.5MB

    • MD5

      8feb32f1c24e913222ffe6245ea49e86

    • SHA1

      fb93436b7c32bddfb807fcbf07a4434b7bf79a3d

    • SHA256

      7c6a80e93e96d417b7eaf9260c5a645d8d45e4c6cf420dcaf482fd480e80ad4e

    • SHA512

      7b75d76bc079e0fd3acf56cc569bfeac5fd3fb180844b243235c5ca04e53b9f96182c087531919f9437b3d9bd857d1678cea4476812b88b95f54bd56ec0c6b9c

    • SSDEEP

      786432:qHkEWCyHVn1sF4Bw7XqjBk2LZNopfjZqGWHeQZqQ6:qERKFpXqxqf1qGMenQ6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks