General

  • Target

    6706364c78566c589c6c45217e852b02.bin

  • Size

    1.5MB

  • Sample

    241212-bthansznar

  • MD5

    e794399f01b6fb0866da222ca754c720

  • SHA1

    4b4fbe9aa4e5693b1544031515986bc9b8d16fa4

  • SHA256

    02f08c858916067c2b1a33de8748c875efb373fe93c2b6cff3887021b89c5e3f

  • SHA512

    19eacb7f35e5a02559e35d1937aff496dab51cfcec4263e226ead0b477030580bc4105bcfe9c40341af7fafe6c042d88c2e26e684b9e405e654cf4632df3201f

  • SSDEEP

    24576:UhfdPOb5vOXfZMVhESwzUvRfA0ZIq9q3z+Rr8AEOXPVWN6q+txCIV1OSibpfQzzE:8dPOb52XqmUvRfAvc98AvfVWwq+t4qlw

Malware Config

Targets

    • Target

      87fa5d0d7912d7a1295e7d585f41797bc5c76a5ea7d9d7b362fcc20472715f9b.exe

    • Size

      1.9MB

    • MD5

      6706364c78566c589c6c45217e852b02

    • SHA1

      e0bc8a67a91d5ea42c072e63f36f4993d9620c2d

    • SHA256

      87fa5d0d7912d7a1295e7d585f41797bc5c76a5ea7d9d7b362fcc20472715f9b

    • SHA512

      3aed779886dcb08bac7eda66cf4b4adbcf420ac0dfc702ef645f231cc40f0801cd16b35cafb12dc5b7125c237df65df091366c884ce20158447752507e1023f7

    • SSDEEP

      49152:JV9LiEUzT6V+qiRGVcqb++v8PlPwvwOfPGZyM1b2DAWsM:JnezTGriRRq3vGNCJfPOy4b

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks