General

  • Target

    12.zip

  • Size

    190B

  • Sample

    241219-wflq6axnel

  • MD5

    acade08e83e1ef0264a7683ea9c17c2e

  • SHA1

    e9aeff6ca39b52349c73af659b4d1a10a8859117

  • SHA256

    c46112e4d73ebc9078837adc6e71113ca6f485a3f0a3a5437ddb2cae5356b02c

  • SHA512

    38f17b4c6c6e5e3f63c40039ca463b0b7543526f57ab6009a912b780977c3be0c72a3f37a612c1f9da88a09cba382ad6e4a79aad24c7c8adef88d0f2e791ea85

Malware Config

Targets

    • Target

      Hid.bat

    • Size

      42B

    • MD5

      43cd3c49420b97a7e59f4505e592c497

    • SHA1

      b404d304be17050293e6afbe607d507c03e48154

    • SHA256

      44b7b386c2fc2a0e0e9e37e67c163f3cb5588bfd8d861315fa83ed10398538ea

    • SHA512

      977b04f7cf0cf3b43ce491f661134184029c7381baeef1a920fe15c6d2b2f522f27f105a45234eb152f6073ed5adfa8db48efa2e6c9c458bf54b2c6f5e776696

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: currency-file@1

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks