General

  • Target

    52796cc15b3bc3df709a40ef1c164c9314096fb1eaf9167002c98a4a2fbf0869N.exe

  • Size

    1.8MB

  • Sample

    241216-s1zlzavlgp

  • MD5

    4c8c00791894ebf2accb5b77a4509610

  • SHA1

    186cf1ab5c40ced62a351ad2248704c69b292586

  • SHA256

    52796cc15b3bc3df709a40ef1c164c9314096fb1eaf9167002c98a4a2fbf0869

  • SHA512

    c4f559445d607e0457f4b4ea11f09d4eb6d13999e393d5f77ab19758d0d7f9608133118cb3a7a72b07ef0323aa1170cd346d8d0077b70883d61ced70edddf1d4

  • SSDEEP

    49152:IBJAv1XMSYVEb9rGJ/ChuhAeaCGcZPjCjDUVQslg+:y2tp3bpGghYhJGcF+jDUuslg+

Malware Config

Targets

    • Target

      52796cc15b3bc3df709a40ef1c164c9314096fb1eaf9167002c98a4a2fbf0869N.exe

    • Size

      1.8MB

    • MD5

      4c8c00791894ebf2accb5b77a4509610

    • SHA1

      186cf1ab5c40ced62a351ad2248704c69b292586

    • SHA256

      52796cc15b3bc3df709a40ef1c164c9314096fb1eaf9167002c98a4a2fbf0869

    • SHA512

      c4f559445d607e0457f4b4ea11f09d4eb6d13999e393d5f77ab19758d0d7f9608133118cb3a7a72b07ef0323aa1170cd346d8d0077b70883d61ced70edddf1d4

    • SSDEEP

      49152:IBJAv1XMSYVEb9rGJ/ChuhAeaCGcZPjCjDUVQslg+:y2tp3bpGghYhJGcF+jDUuslg+

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks