General

  • Target

    1bafdc2e89ed7d118b2695ec89ccd09f0114020308b94da96d8284022e04ad11N.exe

  • Size

    952KB

  • Sample

    241215-1ypb8aypdx

  • MD5

    ea363f97b2eb4114d986a81633f21b20

  • SHA1

    5358a564395c004068ed9907cc6a0809801b8581

  • SHA256

    1bafdc2e89ed7d118b2695ec89ccd09f0114020308b94da96d8284022e04ad11

  • SHA512

    b40d208dea8daa1ada700aa93e2559f3ee2d11e8f59b38a288ef8d402a8a11eef3636dd3460d21b72bf3bca78bd2c8ebfc9690bc95e40dd79e427e1122be1096

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Targets

    • Target

      1bafdc2e89ed7d118b2695ec89ccd09f0114020308b94da96d8284022e04ad11N.exe

    • Size

      952KB

    • MD5

      ea363f97b2eb4114d986a81633f21b20

    • SHA1

      5358a564395c004068ed9907cc6a0809801b8581

    • SHA256

      1bafdc2e89ed7d118b2695ec89ccd09f0114020308b94da96d8284022e04ad11

    • SHA512

      b40d208dea8daa1ada700aa93e2559f3ee2d11e8f59b38a288ef8d402a8a11eef3636dd3460d21b72bf3bca78bd2c8ebfc9690bc95e40dd79e427e1122be1096

    • SSDEEP

      24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks