General

  • Target

    TempSpoofer.exe

  • Size

    80KB

  • Sample

    241124-brpxqswrby

  • MD5

    5374b62745b86ac86e6a4c89921182cd

  • SHA1

    921a4a2d5c6489bc5a0b5697bf19678495dfadbf

  • SHA256

    550b6cbdefab0c183b41f9fa96c8ed0797efaf13081fd6ca745f30670d8725f0

  • SHA512

    e56cb7ebd3be67e94776043f885412e5f42cfc0c258fe9a2f2fe3dd79f115b0416f64df5cfc82fa275ada0787224ece1400a86bd9567f6e014361ef87082461f

  • SSDEEP

    1536:brvp14xgT6UellETcCMUlzLCYzha6a2UWwZyeMcxV6MFae:bbVjnTcCMUZLZBUWwZhMcCMFa

Malware Config

Targets

    • Target

      TempSpoofer.exe

    • Size

      80KB

    • MD5

      5374b62745b86ac86e6a4c89921182cd

    • SHA1

      921a4a2d5c6489bc5a0b5697bf19678495dfadbf

    • SHA256

      550b6cbdefab0c183b41f9fa96c8ed0797efaf13081fd6ca745f30670d8725f0

    • SHA512

      e56cb7ebd3be67e94776043f885412e5f42cfc0c258fe9a2f2fe3dd79f115b0416f64df5cfc82fa275ada0787224ece1400a86bd9567f6e014361ef87082461f

    • SSDEEP

      1536:brvp14xgT6UellETcCMUlzLCYzha6a2UWwZyeMcxV6MFae:bbVjnTcCMUZLZBUWwZhMcCMFa

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks