General

  • Target

    NewLauncher Installer.exe

  • Size

    274.0MB

  • Sample

    241128-syrtca1qgs

  • MD5

    57ec89a694aa9f06e258bf8d464c3dbb

  • SHA1

    4ea00ac498ee8cd9b06321638c3f214fde0e7c17

  • SHA256

    3e58b22fc7a8ea15b27d578e4f6add3ff90405bce8577b1bcbfac561994b194f

  • SHA512

    1d36c6c42e1132e29ac7f8bb24764c52b2dececef4dc0e51febf7cdc5229604fa0dce7ebe1d28b7920f0cea38dfb85d12ecb40db29d38ec6fce6a36f90f6cd8f

  • SSDEEP

    6291456:7C4P7RCav2Fsjjn0C4P7RCav2FmUduzez4tL9qul+q0C4P7RCav2Fc6Zu5WCmnO:+4jRCa2sj4jRCa2Lduu4ZB94jRCa2Lw

Malware Config

Targets

    • Target

      NewLauncher Installer.exe

    • Size

      274.0MB

    • MD5

      57ec89a694aa9f06e258bf8d464c3dbb

    • SHA1

      4ea00ac498ee8cd9b06321638c3f214fde0e7c17

    • SHA256

      3e58b22fc7a8ea15b27d578e4f6add3ff90405bce8577b1bcbfac561994b194f

    • SHA512

      1d36c6c42e1132e29ac7f8bb24764c52b2dececef4dc0e51febf7cdc5229604fa0dce7ebe1d28b7920f0cea38dfb85d12ecb40db29d38ec6fce6a36f90f6cd8f

    • SSDEEP

      6291456:7C4P7RCav2Fsjjn0C4P7RCav2FmUduzez4tL9qul+q0C4P7RCav2Fc6Zu5WCmnO:+4jRCa2sj4jRCa2Lduu4ZB94jRCa2Lw

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks