General

  • Target

    01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.zip

  • Size

    987KB

  • Sample

    241222-229m1a1qgp

  • MD5

    3f7f04c8e01e4f49e9c0528bb76b9ac1

  • SHA1

    2eeb08c7d5e304ce34b497c1f7fdc64356737a01

  • SHA256

    8050f43862d93cfd709af334580335f642705ae15b4daaf16199bdc3a9ca037b

  • SHA512

    5b5ed6f45ffce298ef1461784fa7db45e3af73c29ae207c353eb5eb4f9c1a648991e7ed6d6d17f6cf8365a6a2d62180dc88bbd66bcf2dbd4850997d0b79f5ac2

  • SSDEEP

    24576:gshltUgLsknrnjSPHW7x4cag6CYnPfLFP/pbvtHAnXgOBVniiDj:p7UgYkrOixNN+PfZpUFNFDj

Malware Config

Targets

    • Target

      01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111.exe

    • Size

      1.4MB

    • MD5

      13aeda86aafde4051d7ca9280dac9a67

    • SHA1

      fd4a6168c79c28d6e25be7c799ffd25c2dbd69d0

    • SHA256

      01ef75f76ae452476b1de15a3238617f33c4b685e5bb423de49f34f44b0a0111

    • SHA512

      ddfc9a2a5a2f3b83023eecf4053de1930ebf9486d1cff869ab6d2199c5978926b2c4a6468358c627f4cff16a235c8d23b98711d8b3bf608ed03f4e4d7d7d0194

    • SSDEEP

      24576:Lw/d/t+9SDGMoRNkj63uYnqzW1yqCc/CfVsdEYXHo1o9edFt4k:M/d/HP6+Ynb18Kfdx3IoIt

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks