General

  • Target

    6b9554367a439d39a00a0dff9a08b123.bin

  • Size

    1.5MB

  • Sample

    250113-bp7d1aymbz

  • MD5

    be93a046d653237e3e9a7996f31b624a

  • SHA1

    e0af016a1a9e9a6765a3c627042e42a4fa3e5400

  • SHA256

    11d8980ca6e1f41a7ede9bf1aca61638bbf024ac1a38eb4b0424f6dbc79d991d

  • SHA512

    77c1e39aad69fe1d46568259320ddada0f87fa70aed7b157f27c578e67b541745992b667cda3646f385d06cdf8faf798b03d5867a2d8c407fc5c0c9b57df3650

  • SSDEEP

    24576:XpoSrzxYXOWvIzPP/Va6RlRfFjCvZKwzQWYyl1jxJU1Sc7wAna9xF6mUdo6u81jC:XpnXyTgjnVa6Rlnwzt/1A1SL45u3Y7K

Malware Config

Targets

    • Target

      3332277b9e53375e998ccf981cdb0519fea7721b5e79a3d7a60b83f448f6c0a9.exe

    • Size

      1.9MB

    • MD5

      6b9554367a439d39a00a0dff9a08b123

    • SHA1

      e1d22cde90c297c10f4fcba5b3980e5d551eb0b3

    • SHA256

      3332277b9e53375e998ccf981cdb0519fea7721b5e79a3d7a60b83f448f6c0a9

    • SHA512

      72ffbca1a2aa7cd2bb6b963d97b43d7d5eab9a11d09c647c7679e71877927b8c021e28cd1e28ae9ac5300c8621ba97aae6699e1abddc58be89c9bb3e84d1c720

    • SSDEEP

      49152:xh0kcmcdp/caMMlawkBXRInaKYRouPbWGQ2:xhbcmcfM/N1RSavoujWH

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks