General

  • Target

    3614F4C4B137E627F03D0118F4779D52.exe

  • Size

    1.8MB

  • Sample

    250111-rbjc1s1jfs

  • MD5

    3614f4c4b137e627f03d0118f4779d52

  • SHA1

    07120124f394eddb46c3c2a985063718d17fc48d

  • SHA256

    4acc21ce239f8eadca573c53b92cc49b96a9d7b96f7cfe4a5511847148839a2a

  • SHA512

    bfc1cb74b69f1bc0e47eefee7614760edfe068ac9471ed211a87d4b1a47f8f2e784db2beb79b23988ba7810d525eb2463f75eacf0df9f560a2d2e0e52a0e7c7f

  • SSDEEP

    24576:wwkCsYsgFFuqj/oBxyALwMosh651ZBvISmXqD0Z+rtyumwwI3PXGSfaeiLUb+7xE:B5kBTXYD3Yo0ZKy7IfXGfLU67x6sg

Malware Config

Targets

    • Target

      3614F4C4B137E627F03D0118F4779D52.exe

    • Size

      1.8MB

    • MD5

      3614f4c4b137e627f03d0118f4779d52

    • SHA1

      07120124f394eddb46c3c2a985063718d17fc48d

    • SHA256

      4acc21ce239f8eadca573c53b92cc49b96a9d7b96f7cfe4a5511847148839a2a

    • SHA512

      bfc1cb74b69f1bc0e47eefee7614760edfe068ac9471ed211a87d4b1a47f8f2e784db2beb79b23988ba7810d525eb2463f75eacf0df9f560a2d2e0e52a0e7c7f

    • SSDEEP

      24576:wwkCsYsgFFuqj/oBxyALwMosh651ZBvISmXqD0Z+rtyumwwI3PXGSfaeiLUb+7xE:B5kBTXYD3Yo0ZKy7IfXGfLU67x6sg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks