General

  • Target

    295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe

  • Size

    2.4MB

  • Sample

    241123-xerrfszrcw

  • MD5

    b3678e32183a7aeb4c8bce890f9898de

  • SHA1

    922e6553a8ed9b7e11206c73a2db30f98db91077

  • SHA256

    295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205

  • SHA512

    1ec5f3709d6b3bc5d64416e939eaa1adeb840025706d68fa8c812fe3469b3f8177bdb508524d097c9d8518cee229e0c73e502b6e87c3235a053b3e33594b118a

  • SSDEEP

    49152:PbA3uqwj3o71JZAB3jBn8cjcdPH/+yDMu3JgHzCueUTG4:PbMBLZABTF8Ic94u3YveX4

Malware Config

Targets

    • Target

      295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205.exe

    • Size

      2.4MB

    • MD5

      b3678e32183a7aeb4c8bce890f9898de

    • SHA1

      922e6553a8ed9b7e11206c73a2db30f98db91077

    • SHA256

      295688858c999f14377a10366d1b74037d6c7e92aa36554bf5b7ce478a6e6205

    • SHA512

      1ec5f3709d6b3bc5d64416e939eaa1adeb840025706d68fa8c812fe3469b3f8177bdb508524d097c9d8518cee229e0c73e502b6e87c3235a053b3e33594b118a

    • SSDEEP

      49152:PbA3uqwj3o71JZAB3jBn8cjcdPH/+yDMu3JgHzCueUTG4:PbMBLZABTF8Ic94u3YveX4

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks