General

  • Target

    32db4bf35b9c2efc730718e2f8cd4fbc.bin

  • Size

    1.4MB

  • Sample

    250110-bgtsyayndj

  • MD5

    acbb2fddfcfb1a11574d6c2b7a3eed06

  • SHA1

    fa4808e2ea289551e3ccc2f19060184aa5ede380

  • SHA256

    bd97113232c06c13e8659adacaec61f3b66414d8be912d888aa1b1fce3ab3684

  • SHA512

    2a705f9cfa060dba41451f6190cc6cd233fee57bff9c56fd54d01c09d99356a0e34dc55504cdc006b0dd4bfde955ef843dd0d08365451eea91e3eb8f5491af2b

  • SSDEEP

    24576:bLiSgABGhjzFdBREjvxr0TrVN4ELlKWX3fkUKtKXO6ZDmX6Nm491vwVBAa:b9B8ZXuir4EEWMUKGDI6NmuvaBp

Malware Config

Targets

    • Target

      2fb0b933c97aa9b37e31f7adf38695e8185b61c7d312c183f05fd4256ef38497.exe

    • Size

      1.8MB

    • MD5

      32db4bf35b9c2efc730718e2f8cd4fbc

    • SHA1

      616a5c549f6c1c191f82d8cea82c65e25869241e

    • SHA256

      2fb0b933c97aa9b37e31f7adf38695e8185b61c7d312c183f05fd4256ef38497

    • SHA512

      577146b764a00bcd3ff34a4ec278c49db91e7a5eb3647f561455499a7c01c52c513a5283041a378ffb57747e0ad0c93795d7287b5814a01f94612ac81f1828c2

    • SSDEEP

      24576:PYWx+zBv7JhqvqIsCHeX2RYk1ORuQfAb3ev4XwpgcYZSqu/lYXeHB80K:PAz2H5RYj4QyQZviTu/Ouh

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks