General

  • Target

    7fb943a550881e7c59acdbba1164cbfd.bin

  • Size

    1.8MB

  • Sample

    250113-btpdzs1qaj

  • MD5

    503c37f2feb5c37e5adda47a3035ca96

  • SHA1

    61854791b24f4da7a38e37175369fbc0b0c89ba7

  • SHA256

    4e52aa426e6c672b59a40e37d5c227f1aa3398fbf91c25c88e7825d3f68f380c

  • SHA512

    c85894ac31016a3f99bb6abca5c4f0d1ff78a055a17d00f0491adc25121c2fa169505b9daa8fc4c9110682a8dde8c02f68e44a3752f35462468aee8cca5b4403

  • SSDEEP

    49152:YFKHlPqIi8qtjUxar123/rcZyBXk6Dryte3F0HLd:YoFNiz2TCAk6fyte1M

Malware Config

Targets

    • Target

      f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe

    • Size

      2.2MB

    • MD5

      7fb943a550881e7c59acdbba1164cbfd

    • SHA1

      ed5bb95d080cbcc5fafaaa0949fdcdfaece4dabe

    • SHA256

      f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510

    • SHA512

      a4b7e40e07f1d5b24fd2bec828c433d984087ee22478f11da9a2ab4bfb42c3c4609e3d24ba19e8fd0239bfffa532c6e4526d6ff9eb7e3a3d1788cb3e5f6e66fc

    • SSDEEP

      49152:K31tZUmbFNH1wLJDPqTo9lIS/MXU2F4/1l5eQ7K6:KltZUE6NDyTo9lv2F+VvK6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks