General

  • Target

    c53519ff0006a7b1a806fb8cac04e13fb6afa8ef4555a5e3079ac2b200d112af.exe

  • Size

    8.4MB

  • Sample

    241121-eqel6ayme1

  • MD5

    23e7c44b93cb1b729d816de6e2800888

  • SHA1

    aa0d6d3655991fcc2bee30f2e4002150c3c08c7f

  • SHA256

    c53519ff0006a7b1a806fb8cac04e13fb6afa8ef4555a5e3079ac2b200d112af

  • SHA512

    78671a96f54348695f839199340cd4fa5f9816c0ab740c8492f877deba6bed3191407e3096f3bd107cde7e65cd12a15140222656c2f53f8d7ece6881ec456fb9

  • SSDEEP

    24576:L+O4Gq8ijgGfy8vWYT0Z3VTaLMo6e7h4su+A3uFDIU2lklx2yDUZFyn7ftR0K1ww:6hJgGfys0DTi7hhcGWn1ZBfY4KGrM

Malware Config

Targets

    • Target

      c53519ff0006a7b1a806fb8cac04e13fb6afa8ef4555a5e3079ac2b200d112af.exe

    • Size

      8.4MB

    • MD5

      23e7c44b93cb1b729d816de6e2800888

    • SHA1

      aa0d6d3655991fcc2bee30f2e4002150c3c08c7f

    • SHA256

      c53519ff0006a7b1a806fb8cac04e13fb6afa8ef4555a5e3079ac2b200d112af

    • SHA512

      78671a96f54348695f839199340cd4fa5f9816c0ab740c8492f877deba6bed3191407e3096f3bd107cde7e65cd12a15140222656c2f53f8d7ece6881ec456fb9

    • SSDEEP

      24576:L+O4Gq8ijgGfy8vWYT0Z3VTaLMo6e7h4su+A3uFDIU2lklx2yDUZFyn7ftR0K1ww:6hJgGfys0DTi7hhcGWn1ZBfY4KGrM

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks