General

  • Target

    adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe

  • Size

    1.9MB

  • Sample

    241122-jgf6vasnhj

  • MD5

    f93786885d2a064e5bfaa873d5adce3a

  • SHA1

    2f5607b932aca74701dd9aa0a581d7e6971df23f

  • SHA256

    adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca

  • SHA512

    61d28dc832fd3ec100841323e1cdb3da166c0673bfbb20ab2ccff25d0e90b407b05fe8f59eb0ce93c0fdf130aa2b12e0cc7ce2158b4b2a22f51d7701550782c9

  • SSDEEP

    49152:HN54VMGOhLmPkO4koPyVu5eAEfgPwNqsrui:v0vEf8u5eAmFZ

Malware Config

Targets

    • Target

      adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe

    • Size

      1.9MB

    • MD5

      f93786885d2a064e5bfaa873d5adce3a

    • SHA1

      2f5607b932aca74701dd9aa0a581d7e6971df23f

    • SHA256

      adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca

    • SHA512

      61d28dc832fd3ec100841323e1cdb3da166c0673bfbb20ab2ccff25d0e90b407b05fe8f59eb0ce93c0fdf130aa2b12e0cc7ce2158b4b2a22f51d7701550782c9

    • SSDEEP

      49152:HN54VMGOhLmPkO4koPyVu5eAEfgPwNqsrui:v0vEf8u5eAmFZ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks