General

  • Target

    92d29106be881759ef6f045a3415137d.bin

  • Size

    1.7MB

  • Sample

    250113-byb98ayqds

  • MD5

    7d1c1203f4d144e2c9f9b482ef23b0b3

  • SHA1

    e012a5ac7c0389d95f3dc6d429f6ee30f2c3e754

  • SHA256

    88414350df955ae0d1c3e062ee97a4da79361ec71711c4c40273fa70a4ccce53

  • SHA512

    618802b02a48189ae431771abe8bae23f2b3da9fea0dbf7b3a8791f35521d81103e063f05eb2053de77fc38d3bdb82b9790c0830c3df06e430878fc3d723b81a

  • SSDEEP

    49152:aYJzXjLQWhHtuMr+HwdTPVpQXpS8CzydgVV+ty:a0bvN5BpypUC0V+E

Malware Config

Targets

    • Target

      b1996319c3b0fafa04179dd7b7de47c74be2dc3dc0d6aa04030b645970e1a9b0.exe

    • Size

      2.2MB

    • MD5

      92d29106be881759ef6f045a3415137d

    • SHA1

      9b307b4b98851c4325a1f2746c7827a0d14c7e36

    • SHA256

      b1996319c3b0fafa04179dd7b7de47c74be2dc3dc0d6aa04030b645970e1a9b0

    • SHA512

      43b526bd521ac72688dc7670c9c9ce323b39675620a0bf202d783906ac650fdc1bbefeb5876f97c5fcf525e6c5d39cc4b29ffd43acd4560baf0745126c5eec8e

    • SSDEEP

      49152:IBJ+h0kcmcdp/caMMlawkBXRInaKYRouPbWGQ2L:yQhbcmcfM/N1RSavoujWHk

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks