General

  • Target

    F4620C0AFA8E21897509B2E7215097F5.exe

  • Size

    2.1MB

  • Sample

    241123-31mmhstkdt

  • MD5

    f4620c0afa8e21897509b2e7215097f5

  • SHA1

    af216ca6105e271a3fb45a23c10ee7cf3158b7e1

  • SHA256

    8daf7dcdf256d7de40d33e5550dc5e8bbf887b8c4b7f49c79a15c96dad867f82

  • SHA512

    68b875acc06d9c3796f49377b5b25a5e8b9a380221eea59e4274249ca7d2bff10c3fc5edf50eae5da726afea882e0e777af86af25be7b57c8fbfd70448d8d7dd

  • SSDEEP

    49152:IBJz3c6UY0hj8eu32ILwfhNE5I6OrLCXLdsN6:yh3cvY0Z8pGWwfhyxOrUsN6

Malware Config

Targets

    • Target

      F4620C0AFA8E21897509B2E7215097F5.exe

    • Size

      2.1MB

    • MD5

      f4620c0afa8e21897509b2e7215097f5

    • SHA1

      af216ca6105e271a3fb45a23c10ee7cf3158b7e1

    • SHA256

      8daf7dcdf256d7de40d33e5550dc5e8bbf887b8c4b7f49c79a15c96dad867f82

    • SHA512

      68b875acc06d9c3796f49377b5b25a5e8b9a380221eea59e4274249ca7d2bff10c3fc5edf50eae5da726afea882e0e777af86af25be7b57c8fbfd70448d8d7dd

    • SSDEEP

      49152:IBJz3c6UY0hj8eu32ILwfhNE5I6OrLCXLdsN6:yh3cvY0Z8pGWwfhyxOrUsN6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks