General

  • Target

    29646558d614f7a325d5f1aa74681a2b0cb371ea64089b9c5500cc9c577386e3

  • Size

    952KB

  • Sample

    241222-zpewraymex

  • MD5

    b2d17deb76abae66520bc01b0f7ef3a4

  • SHA1

    1f459e45ec4b3b316b8690b6501db4b7e93cbc8c

  • SHA256

    29646558d614f7a325d5f1aa74681a2b0cb371ea64089b9c5500cc9c577386e3

  • SHA512

    52141770e8987d141445ad4b474bf88f049500ac31d6ffc11cf2ea47430aad219c943e08c219621c4509f02aa6d6a71055b34755db79767bd4c8d2e5fe120d39

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Targets

    • Target

      29646558d614f7a325d5f1aa74681a2b0cb371ea64089b9c5500cc9c577386e3

    • Size

      952KB

    • MD5

      b2d17deb76abae66520bc01b0f7ef3a4

    • SHA1

      1f459e45ec4b3b316b8690b6501db4b7e93cbc8c

    • SHA256

      29646558d614f7a325d5f1aa74681a2b0cb371ea64089b9c5500cc9c577386e3

    • SHA512

      52141770e8987d141445ad4b474bf88f049500ac31d6ffc11cf2ea47430aad219c943e08c219621c4509f02aa6d6a71055b34755db79767bd4c8d2e5fe120d39

    • SSDEEP

      24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks