General

  • Target

    ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12

  • Size

    827KB

  • Sample

    241202-q192la1qam

  • MD5

    024abbb7e999cf09b8aee01979296d38

  • SHA1

    f883c399426d39fa169078cd92ea3bf360bd0e6b

  • SHA256

    ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12

  • SHA512

    fd6cadc5814b1cd9617600f645ed304445960eb810ffd7c3e919c22bf7f80e1411354ef9a0a5183ef35aaf8e18b6e2c08a0a02e26428b78f12723b4e22a5b389

  • SSDEEP

    12288:Qr5J4kXbiCU0qbEPGGoWfbDNz4ZH1z3gROZ84k4zizkx:3kXbiDEPGGoWbDNDEZ8342zO

Malware Config

Targets

    • Target

      ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12

    • Size

      827KB

    • MD5

      024abbb7e999cf09b8aee01979296d38

    • SHA1

      f883c399426d39fa169078cd92ea3bf360bd0e6b

    • SHA256

      ab9a6a7f554c6eaf3b6285fb12351ee81132180581f39b5c19019870a7162b12

    • SHA512

      fd6cadc5814b1cd9617600f645ed304445960eb810ffd7c3e919c22bf7f80e1411354ef9a0a5183ef35aaf8e18b6e2c08a0a02e26428b78f12723b4e22a5b389

    • SSDEEP

      12288:Qr5J4kXbiCU0qbEPGGoWfbDNz4ZH1z3gROZ84k4zizkx:3kXbiDEPGGoWbDNDEZ8342zO

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks