General

  • Target

    c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe

  • Size

    952KB

  • Sample

    241206-p18cbstpbr

  • MD5

    88da2110432e89c73ed202c4adbec720

  • SHA1

    e9059a8ba711fe7475bc0de9efe75f758ce6e5e5

  • SHA256

    c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717

  • SHA512

    9e4b32ac7c8bde6cf301a7194a91611d7c9fab5ff4d9f4e6ffce88725383452ef7e3336bf4485550f41433068c651f439b0b931e4366f120d8edef0bb1c7a38a

  • SSDEEP

    24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK

Malware Config

Targets

    • Target

      c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717N.exe

    • Size

      952KB

    • MD5

      88da2110432e89c73ed202c4adbec720

    • SHA1

      e9059a8ba711fe7475bc0de9efe75f758ce6e5e5

    • SHA256

      c844c4574183306af2f9cd32e43eebeb0a33e5d804391eeda8d5f4fd7c34b717

    • SHA512

      9e4b32ac7c8bde6cf301a7194a91611d7c9fab5ff4d9f4e6ffce88725383452ef7e3336bf4485550f41433068c651f439b0b931e4366f120d8edef0bb1c7a38a

    • SSDEEP

      24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks