General

  • Target

    a7a6bc6eb9a42d31662bc3b20a5fcde5cbe63b64c48c4fb484ba249baf5b7da4

  • Size

    1.5MB

  • Sample

    250108-gqt3yszjgq

  • MD5

    e663bacf67d867450934809cff3fd749

  • SHA1

    14fed8278438f7d659341d4642b99667e154d33b

  • SHA256

    a7a6bc6eb9a42d31662bc3b20a5fcde5cbe63b64c48c4fb484ba249baf5b7da4

  • SHA512

    957da6b848aa325dd63bdb65f772daa30b83d3396bb633725765fd8aa2888153cb871b0037768876ad3082885260fb4a5c8a5984391f210ee32eb087d7ff2411

  • SSDEEP

    24576:UNNUtQhWhtqDfDXQdy+N+gfQqRsgFlDRluQ70eJiVbWpR:kzhWhCXQFN+0IEuQgyiVK

Malware Config

Targets

    • Target

      a7a6bc6eb9a42d31662bc3b20a5fcde5cbe63b64c48c4fb484ba249baf5b7da4

    • Size

      1.5MB

    • MD5

      e663bacf67d867450934809cff3fd749

    • SHA1

      14fed8278438f7d659341d4642b99667e154d33b

    • SHA256

      a7a6bc6eb9a42d31662bc3b20a5fcde5cbe63b64c48c4fb484ba249baf5b7da4

    • SHA512

      957da6b848aa325dd63bdb65f772daa30b83d3396bb633725765fd8aa2888153cb871b0037768876ad3082885260fb4a5c8a5984391f210ee32eb087d7ff2411

    • SSDEEP

      24576:UNNUtQhWhtqDfDXQdy+N+gfQqRsgFlDRluQ70eJiVbWpR:kzhWhCXQFN+0IEuQgyiVK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks