General

  • Target

    50ee114bba99ce3a7ba3e64c0080a644.bin

  • Size

    1.7MB

  • Sample

    250113-bpptys1nbn

  • MD5

    de783830a09fa9dc933995ae6cd1b320

  • SHA1

    b49d8cb8a194843c203a987c1a786d96252e5f3e

  • SHA256

    18f98cf70e93f573af35a3f74fc6bf092d249b554336320f6c17a8925c35f8bb

  • SHA512

    937dc4ae618f9e099208d7cfecbc8183dd9a6e5a4d7a95e39152ced25fabe4d2cc4830c979251a09cf9ab1256ec0877552972b91b400fcdf88b34daa4560b4f3

  • SSDEEP

    24576:VC6eF5Q1wduDN8T4OfopBo+vn9IHKnrgrMRiMV0oRNTWTUrVuXyZfnJb4/SU4FSD:V92Qqd8Boq9IPbM72Uc0nt46soQoGMO

Malware Config

Targets

    • Target

      e7fb15dc103eca61803e214b533fb4dd3fa3d4b171886f452eb6ab8353ee2aa6.exe

    • Size

      2.2MB

    • MD5

      50ee114bba99ce3a7ba3e64c0080a644

    • SHA1

      3c9f1189b07b612888a1124714d1586408c78ba0

    • SHA256

      e7fb15dc103eca61803e214b533fb4dd3fa3d4b171886f452eb6ab8353ee2aa6

    • SHA512

      58b94a8596d4a94b28da6f0051d90bf098d9def8a112d9541eca814c7b46f5bae619a331831c060eff04f39b62cac1a2ad2a5fe380c75f59aa79322e09a4b64d

    • SSDEEP

      49152:IBJaWLMtwyMxRizAwgueOJNN3lRHiKLWDWUs:yALwyMb9ue0NTH2Ps

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks