General

  • Target

    BootstrapperV1.19.zip

  • Size

    1.9MB

  • Sample

    241122-yc2z3stjbl

  • MD5

    c4f56f981bd109e0f90f95e60ba5e3c4

  • SHA1

    f96ec46dea31a127f13effba57ab4caaf814570b

  • SHA256

    1e1551129f56f0f52da5a7ba675eb1aacc8f0ca28118354d3d14f0ac50362b1c

  • SHA512

    4f26d19202d0d7b83a9e41f0d8f0f6a3cb8844d6c2413c49937f0d29ff482fdcbde0d28603bfebe3e78873417031697eedc2ebe552bd65cc21c92936b7fb6b4c

  • SSDEEP

    49152:q96Dl8Da2wQRbU8z/RQnjQmo5KqtmCZXw9+dp/GDHWK:0DapQRbU8zZQnjQmogqkCZXw9+/uJ

Malware Config

Targets

    • Target

      BootstrapperV1.19.exe

    • Size

      3.1MB

    • MD5

      c9d720a4200df5064f655adc3656056f

    • SHA1

      0dc179cfc3cf564ea1e9c85e012ac9bda3b40464

    • SHA256

      9cd19cf01e1d8c64caa0dffcd07dfb3304fc7257a1c468c0f3d4df1ad696319f

    • SHA512

      f0628313d0bccdd94795d649f1f6eda194b97fe991fb1755d9525cf944b310569a6dc0a155caf17dc4e49fda4c5eaf42063443bb67abc19a079f934570136852

    • SSDEEP

      49152:ivotkNjg/lhqZvGyBJa+U5kzXDFrO0iTb0bzveEX99h:i5ZvGko+U8XBgseE5

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks