General

  • Target

    4128341009cc3f617bf5612d7c933bc99c00eea63dfce6f24bbe0ba16f1bb1f0.exe

  • Size

    2.1MB

  • Sample

    241211-j2jgpstra1

  • MD5

    0e0afa05a99d26d55a9df6876eee479f

  • SHA1

    652fe26e32763a493f04e61c5a5d36c628217ef8

  • SHA256

    4128341009cc3f617bf5612d7c933bc99c00eea63dfce6f24bbe0ba16f1bb1f0

  • SHA512

    bc2b23ed0307f7cd81514ff8bfe83316e1b27b6dbd69a08ca0d4618e6363dd3de5d91b1d4f38b059c73c487867c5980b7e7c49c920672589273a140728510cfc

  • SSDEEP

    24576:2TbBv5rUyXVpz/IPMofzXxgF5X1u1seTK44vmrUcSgjBYsRX8TGxj4fY3D5K7TqD:IBJp0PbsCk44v0y4BYgAGxrNKvdVTK

Malware Config

Targets

    • Target

      4128341009cc3f617bf5612d7c933bc99c00eea63dfce6f24bbe0ba16f1bb1f0.exe

    • Size

      2.1MB

    • MD5

      0e0afa05a99d26d55a9df6876eee479f

    • SHA1

      652fe26e32763a493f04e61c5a5d36c628217ef8

    • SHA256

      4128341009cc3f617bf5612d7c933bc99c00eea63dfce6f24bbe0ba16f1bb1f0

    • SHA512

      bc2b23ed0307f7cd81514ff8bfe83316e1b27b6dbd69a08ca0d4618e6363dd3de5d91b1d4f38b059c73c487867c5980b7e7c49c920672589273a140728510cfc

    • SSDEEP

      24576:2TbBv5rUyXVpz/IPMofzXxgF5X1u1seTK44vmrUcSgjBYsRX8TGxj4fY3D5K7TqD:IBJp0PbsCk44v0y4BYgAGxrNKvdVTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks