General

  • Target

    AstralprivateDLL.exe

  • Size

    65.7MB

  • Sample

    241120-j8hhzstqaw

  • MD5

    c9f4668c97eb480751e1bbf6173fc4e1

  • SHA1

    528deade2bc88cafc26f78f7c73490b66abdf370

  • SHA256

    b9f8572fc7a8a6c2230434abb7190ae860f28386b3f0d5e5ee3754c6befca240

  • SHA512

    dd1d2499a2fca08181e43ea53138b3001d5674f2197c8962681bea188a07687feeb19b5bb8fb35e2339739e7df7b2bc2b2166bf02733bb3cf01f90571f874f41

  • SSDEEP

    196608:27H3VIb7wjJfQqkGCaG1R8uzSJzbwHyokFpz/ehFCIUmF4tDDnYdBaUqkM9h8:s6vwmRR85JPwHyjIgIPCRnYBY

Malware Config

Targets

    • Target

      AstralprivateDLL.exe

    • Size

      65.7MB

    • MD5

      c9f4668c97eb480751e1bbf6173fc4e1

    • SHA1

      528deade2bc88cafc26f78f7c73490b66abdf370

    • SHA256

      b9f8572fc7a8a6c2230434abb7190ae860f28386b3f0d5e5ee3754c6befca240

    • SHA512

      dd1d2499a2fca08181e43ea53138b3001d5674f2197c8962681bea188a07687feeb19b5bb8fb35e2339739e7df7b2bc2b2166bf02733bb3cf01f90571f874f41

    • SSDEEP

      196608:27H3VIb7wjJfQqkGCaG1R8uzSJzbwHyokFpz/ehFCIUmF4tDDnYdBaUqkM9h8:s6vwmRR85JPwHyjIgIPCRnYBY

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Modifies security service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Disables Task Manager via registry modification

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks