General

  • Target

    3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15.exe

  • Size

    1.2MB

  • Sample

    241124-hbwtnstrem

  • MD5

    e5a4be0eb47c462ad72240167b00d6eb

  • SHA1

    09793e20889984c4d8f18385052baa82202afca8

  • SHA256

    3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15

  • SHA512

    6c2445109f25acb7d8fb545b66db590ba2c4bcc0237829ce99f7bf0c4f135e37b1b5b4afba2477b807bf36c529d679479265fec7657f89faf052cf532a2e2bd1

  • SSDEEP

    12288:F0GtwVUTytoIn41c6iHKnkUxCj2AqeMQmwWe0ZQyRWkhuq3nbep3+bKDZhW/lc4q:ptDZcpHKnkuGKFplpC+bKlAtc06z

Malware Config

Targets

    • Target

      3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15.exe

    • Size

      1.2MB

    • MD5

      e5a4be0eb47c462ad72240167b00d6eb

    • SHA1

      09793e20889984c4d8f18385052baa82202afca8

    • SHA256

      3a2f1bf0b03ca3faaa196da40be33a132949957dabdb94f6be65c09dbdf9ec15

    • SHA512

      6c2445109f25acb7d8fb545b66db590ba2c4bcc0237829ce99f7bf0c4f135e37b1b5b4afba2477b807bf36c529d679479265fec7657f89faf052cf532a2e2bd1

    • SSDEEP

      12288:F0GtwVUTytoIn41c6iHKnkUxCj2AqeMQmwWe0ZQyRWkhuq3nbep3+bKDZhW/lc4q:ptDZcpHKnkuGKFplpC+bKlAtc06z

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks