General

  • Target

    8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe

  • Size

    952KB

  • Sample

    241122-nlk3tawjfn

  • MD5

    41ccbb9f4e1b3b8acbe42f57842a6ab9

  • SHA1

    777288aa34f632b9279a0ef0ef571ed8c32f6ede

  • SHA256

    8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88

  • SHA512

    b1030ff32bea991d7d1ce92fb6eebdeefb2637cc808becc73ff511112c8079cc7228891ab217d51953b22b768c339eaafe6052a6ba1b3b74fb78c6997d8c27e9

  • SSDEEP

    24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXe:x8/KfRTKQ

Malware Config

Targets

    • Target

      8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88.exe

    • Size

      952KB

    • MD5

      41ccbb9f4e1b3b8acbe42f57842a6ab9

    • SHA1

      777288aa34f632b9279a0ef0ef571ed8c32f6ede

    • SHA256

      8437c6899352c57f314716d1c297418831b42ff83833669e4aed0192a5edca88

    • SHA512

      b1030ff32bea991d7d1ce92fb6eebdeefb2637cc808becc73ff511112c8079cc7228891ab217d51953b22b768c339eaafe6052a6ba1b3b74fb78c6997d8c27e9

    • SSDEEP

      24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXe:x8/KfRTKQ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks