General

  • Target

    d23424c0067404957e3e18f85081a3341bee4165b461f2dcded51fadff7d790bN.exe

  • Size

    1.5MB

  • Sample

    241219-zt59haznfj

  • MD5

    80c10ba32141f1c07e1408cc48a8e4c0

  • SHA1

    a3f2f9c3516e508b2eaf1324a51cfed32e45132e

  • SHA256

    d23424c0067404957e3e18f85081a3341bee4165b461f2dcded51fadff7d790b

  • SHA512

    04f2cc1bfd44d836a906173dcf013ea7a199c4f24be65f6e8308a70a9fba9515511bd8fefcbddf4fa4ed924b4ad5e3923926358495cd6607e63fb7fdfa43ff04

  • SSDEEP

    24576:0NNUtQhWhtqDfDXQdy+N+gfQqRsgFlDRluQ70eJiVbWpR:EzhWhCXQFN+0IEuQgyiVK

Malware Config

Targets

    • Target

      d23424c0067404957e3e18f85081a3341bee4165b461f2dcded51fadff7d790bN.exe

    • Size

      1.5MB

    • MD5

      80c10ba32141f1c07e1408cc48a8e4c0

    • SHA1

      a3f2f9c3516e508b2eaf1324a51cfed32e45132e

    • SHA256

      d23424c0067404957e3e18f85081a3341bee4165b461f2dcded51fadff7d790b

    • SHA512

      04f2cc1bfd44d836a906173dcf013ea7a199c4f24be65f6e8308a70a9fba9515511bd8fefcbddf4fa4ed924b4ad5e3923926358495cd6607e63fb7fdfa43ff04

    • SSDEEP

      24576:0NNUtQhWhtqDfDXQdy+N+gfQqRsgFlDRluQ70eJiVbWpR:EzhWhCXQFN+0IEuQgyiVK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks