General

  • Target

    32db4bf35b9c2efc730718e2f8cd4fbc.exe

  • Size

    1.8MB

  • Sample

    250108-wzas1axqcx

  • MD5

    32db4bf35b9c2efc730718e2f8cd4fbc

  • SHA1

    616a5c549f6c1c191f82d8cea82c65e25869241e

  • SHA256

    2fb0b933c97aa9b37e31f7adf38695e8185b61c7d312c183f05fd4256ef38497

  • SHA512

    577146b764a00bcd3ff34a4ec278c49db91e7a5eb3647f561455499a7c01c52c513a5283041a378ffb57747e0ad0c93795d7287b5814a01f94612ac81f1828c2

  • SSDEEP

    24576:PYWx+zBv7JhqvqIsCHeX2RYk1ORuQfAb3ev4XwpgcYZSqu/lYXeHB80K:PAz2H5RYj4QyQZviTu/Ouh

Malware Config

Targets

    • Target

      32db4bf35b9c2efc730718e2f8cd4fbc.exe

    • Size

      1.8MB

    • MD5

      32db4bf35b9c2efc730718e2f8cd4fbc

    • SHA1

      616a5c549f6c1c191f82d8cea82c65e25869241e

    • SHA256

      2fb0b933c97aa9b37e31f7adf38695e8185b61c7d312c183f05fd4256ef38497

    • SHA512

      577146b764a00bcd3ff34a4ec278c49db91e7a5eb3647f561455499a7c01c52c513a5283041a378ffb57747e0ad0c93795d7287b5814a01f94612ac81f1828c2

    • SSDEEP

      24576:PYWx+zBv7JhqvqIsCHeX2RYk1ORuQfAb3ev4XwpgcYZSqu/lYXeHB80K:PAz2H5RYj4QyQZviTu/Ouh

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks