General

  • Target

    18e568eb4ca89f8a3e4f04b1eb15472b55b4548f4d153.exe

  • Size

    827KB

  • Sample

    250110-e6x4faslet

  • MD5

    c847a23633e81d799fba45bde7cc9951

  • SHA1

    090035126cabb2fb574175c271097042025202de

  • SHA256

    18e568eb4ca89f8a3e4f04b1eb15472b55b4548f4d15367377a7b942c259319c

  • SHA512

    6b057e15133fe58bc1d105a90b761d2f3558e8a8d3a901d9892905dd75f6be569a4bff4a02d919623305c4d524d96b7f902ef3dded6782cc237b1a47807f34bb

  • SSDEEP

    12288:EP4wqKCH1Hq0nAwv+j49dkrI58NAyZixuj8zXcdFjfpdpoyqQ6Tz:ENdgHqBj49dkrIscuQwbrqQ6Tz

Malware Config

Targets

    • Target

      18e568eb4ca89f8a3e4f04b1eb15472b55b4548f4d153.exe

    • Size

      827KB

    • MD5

      c847a23633e81d799fba45bde7cc9951

    • SHA1

      090035126cabb2fb574175c271097042025202de

    • SHA256

      18e568eb4ca89f8a3e4f04b1eb15472b55b4548f4d15367377a7b942c259319c

    • SHA512

      6b057e15133fe58bc1d105a90b761d2f3558e8a8d3a901d9892905dd75f6be569a4bff4a02d919623305c4d524d96b7f902ef3dded6782cc237b1a47807f34bb

    • SSDEEP

      12288:EP4wqKCH1Hq0nAwv+j49dkrI58NAyZixuj8zXcdFjfpdpoyqQ6Tz:ENdgHqBj49dkrIscuQwbrqQ6Tz

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks