General

  • Target

    99cccc9c25dd6d31cb9541b8fd31cfd5d3f72fc393d157f1592320c9217bc576.exe

  • Size

    952KB

  • Sample

    250113-rza2jsxpap

  • MD5

    c377fc47f9a69dfcdabb7a2e29d40142

  • SHA1

    e65c699ac98ea63b890062321c31b71db64c041c

  • SHA256

    99cccc9c25dd6d31cb9541b8fd31cfd5d3f72fc393d157f1592320c9217bc576

  • SHA512

    b4c213e65217fd720643d6aea277eb4d337de271ed637de2c31fd977408a2c7897bebae59d81bb178fc74b8cc7c879b330fdadbec98d86e85318af65bdf9898b

  • SSDEEP

    24576:e+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX3:Z8/KfRTKd

Malware Config

Targets

    • Target

      99cccc9c25dd6d31cb9541b8fd31cfd5d3f72fc393d157f1592320c9217bc576.exe

    • Size

      952KB

    • MD5

      c377fc47f9a69dfcdabb7a2e29d40142

    • SHA1

      e65c699ac98ea63b890062321c31b71db64c041c

    • SHA256

      99cccc9c25dd6d31cb9541b8fd31cfd5d3f72fc393d157f1592320c9217bc576

    • SHA512

      b4c213e65217fd720643d6aea277eb4d337de271ed637de2c31fd977408a2c7897bebae59d81bb178fc74b8cc7c879b330fdadbec98d86e85318af65bdf9898b

    • SSDEEP

      24576:e+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX3:Z8/KfRTKd

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks