General

  • Target

    936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd

  • Size

    952KB

  • Sample

    241212-arvybatngx

  • MD5

    86706715807ae2b462abebd563006444

  • SHA1

    c47a2955878e4314c2f7e1e2b78fd9054d7d9466

  • SHA256

    936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd

  • SHA512

    45fab92be0eba14855d9645a22bc1c2506018711b13067c160c00de70c381f7fd22f1f48b86b77fb25bb0f9c0cb4896125545831649d01227f4484fcedde7674

  • SSDEEP

    24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK

Malware Config

Targets

    • Target

      936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd

    • Size

      952KB

    • MD5

      86706715807ae2b462abebd563006444

    • SHA1

      c47a2955878e4314c2f7e1e2b78fd9054d7d9466

    • SHA256

      936fd703d9cf5a02721ef6c3ca0f4f147c0de02580213152b3bdd86ba1a581cd

    • SHA512

      45fab92be0eba14855d9645a22bc1c2506018711b13067c160c00de70c381f7fd22f1f48b86b77fb25bb0f9c0cb4896125545831649d01227f4484fcedde7674

    • SSDEEP

      24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks