General

  • Target

    27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0dN.exe

  • Size

    952KB

  • Sample

    241210-xljz7ayqej

  • MD5

    8e6e52fa1da6893e7bee069c7e5dacd0

  • SHA1

    e05854289cc5bb1c60c39fd5453b720cf79eabad

  • SHA256

    27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0d

  • SHA512

    19ca97f006c3a34bc16f6d0538b3ef3d40ebc80c4b2a7019c91ffe989250f8109e337af2c808aa4010c72334d2afd6883f247f573b5b33b5b4d019e234d881b9

  • SSDEEP

    24576:e+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:Z8/KfRTK

Malware Config

Targets

    • Target

      27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0dN.exe

    • Size

      952KB

    • MD5

      8e6e52fa1da6893e7bee069c7e5dacd0

    • SHA1

      e05854289cc5bb1c60c39fd5453b720cf79eabad

    • SHA256

      27e67aaa049c2243423f3c2c33e7747033f63234eda122bc9beaad90528cfd0d

    • SHA512

      19ca97f006c3a34bc16f6d0538b3ef3d40ebc80c4b2a7019c91ffe989250f8109e337af2c808aa4010c72334d2afd6883f247f573b5b33b5b4d019e234d881b9

    • SSDEEP

      24576:e+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:Z8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks