General

  • Target

    58b9de28af1f31614bcf0a6f96f6e20a86295a23e411dd4f1f2b0e7a604b32f3

  • Size

    783KB

  • Sample

    241205-18altavkgy

  • MD5

    6803b89c021d6dc7a6cb6be7e46e6008

  • SHA1

    f1af0021522118f4391eb0e94ccc6b312e44d824

  • SHA256

    58b9de28af1f31614bcf0a6f96f6e20a86295a23e411dd4f1f2b0e7a604b32f3

  • SHA512

    af36b72347016c8a13dbac1a41775ba96a20b10116bb9bbb026cd5ee444077295a3c6f48cc13872b578254dcfdd603a1fe2c1ce78dc265398c194a04d34aa65a

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Targets

    • Target

      58b9de28af1f31614bcf0a6f96f6e20a86295a23e411dd4f1f2b0e7a604b32f3

    • Size

      783KB

    • MD5

      6803b89c021d6dc7a6cb6be7e46e6008

    • SHA1

      f1af0021522118f4391eb0e94ccc6b312e44d824

    • SHA256

      58b9de28af1f31614bcf0a6f96f6e20a86295a23e411dd4f1f2b0e7a604b32f3

    • SHA512

      af36b72347016c8a13dbac1a41775ba96a20b10116bb9bbb026cd5ee444077295a3c6f48cc13872b578254dcfdd603a1fe2c1ce78dc265398c194a04d34aa65a

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks