General

  • Target

    58040788269169456e7831099188a99796227cac63cc28771496d9f97204b895.exe

  • Size

    35.2MB

  • Sample

    250114-c2sbaawqfp

  • MD5

    bc4a8996f18f14f3c77fff13fd23b00d

  • SHA1

    431779aa67e97a32824956d9f3c9122a8340486b

  • SHA256

    58040788269169456e7831099188a99796227cac63cc28771496d9f97204b895

  • SHA512

    1e7e873f4af45963ffd59973bd1d76fbe5bf3841414788ade05aab69f11aae66c5fa3da082a43183a094fb12f5f94e35190e01c9ac224888f557f659a453471c

  • SSDEEP

    98304:yrdqTz4+mudOlbI9tp2159NiHZOGDjuXnU:0dqvYwO23mwY8

Malware Config

Targets

    • Target

      58040788269169456e7831099188a99796227cac63cc28771496d9f97204b895.exe

    • Size

      35.2MB

    • MD5

      bc4a8996f18f14f3c77fff13fd23b00d

    • SHA1

      431779aa67e97a32824956d9f3c9122a8340486b

    • SHA256

      58040788269169456e7831099188a99796227cac63cc28771496d9f97204b895

    • SHA512

      1e7e873f4af45963ffd59973bd1d76fbe5bf3841414788ade05aab69f11aae66c5fa3da082a43183a094fb12f5f94e35190e01c9ac224888f557f659a453471c

    • SSDEEP

      98304:yrdqTz4+mudOlbI9tp2159NiHZOGDjuXnU:0dqvYwO23mwY8

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks