General

  • Target

    d9aef85fc0e89a01c741f919fd9740bc71a970777746338d7c689bb69a5b08cf

  • Size

    2.4MB

  • Sample

    241124-ejryxayqem

  • MD5

    16be4b35fbc59aa471fff4ab77f53c5e

  • SHA1

    5d31d96f0562309fc24294ecfdb3d2a26b238764

  • SHA256

    d9aef85fc0e89a01c741f919fd9740bc71a970777746338d7c689bb69a5b08cf

  • SHA512

    29c902990c748f34c260a08811f1f24956bbc62b7135e58095753ef1f9ad5a094bc560a3dc7aaadb6295eb518b6ad4d645d4775cf11b9a87fd868dc138cf9b45

  • SSDEEP

    49152:pCZ/7MmTJP/uNiZ4qBpWVPW6dKiXGRhuknLwFPy4Eiw7m:aDMmTJXui4qBpWLZgukLwkiA

Malware Config

Targets

    • Target

      d9aef85fc0e89a01c741f919fd9740bc71a970777746338d7c689bb69a5b08cf

    • Size

      2.4MB

    • MD5

      16be4b35fbc59aa471fff4ab77f53c5e

    • SHA1

      5d31d96f0562309fc24294ecfdb3d2a26b238764

    • SHA256

      d9aef85fc0e89a01c741f919fd9740bc71a970777746338d7c689bb69a5b08cf

    • SHA512

      29c902990c748f34c260a08811f1f24956bbc62b7135e58095753ef1f9ad5a094bc560a3dc7aaadb6295eb518b6ad4d645d4775cf11b9a87fd868dc138cf9b45

    • SSDEEP

      49152:pCZ/7MmTJP/uNiZ4qBpWVPW6dKiXGRhuknLwFPy4Eiw7m:aDMmTJXui4qBpWLZgukLwkiA

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks