General

  • Target

    595fab3363e5c90ecf3f7375a0b82d996c96b6a0307ad31e6d79dde07eeb8595.exe

  • Size

    1.1MB

  • Sample

    250114-c3fzmswqhj

  • MD5

    490aa1e56fab47858d780a9fdbafb5bf

  • SHA1

    337d8c93caf41a62f0720ae1f0c02d262ac0a274

  • SHA256

    595fab3363e5c90ecf3f7375a0b82d996c96b6a0307ad31e6d79dde07eeb8595

  • SHA512

    7ff8f6983c789f78f67063745fef92040bb5cb88463e82f6a9f05ba0b48021bd2c541cec6e06726748547f0800abd14dd52fe798feddcb1427a46b87619a4f00

  • SSDEEP

    24576:2TbBv5rUyXV0VTney9cyQJMA+b3iE0nHA6E:IBJgTney9clmA+b3KHe

Malware Config

Targets

    • Target

      595fab3363e5c90ecf3f7375a0b82d996c96b6a0307ad31e6d79dde07eeb8595.exe

    • Size

      1.1MB

    • MD5

      490aa1e56fab47858d780a9fdbafb5bf

    • SHA1

      337d8c93caf41a62f0720ae1f0c02d262ac0a274

    • SHA256

      595fab3363e5c90ecf3f7375a0b82d996c96b6a0307ad31e6d79dde07eeb8595

    • SHA512

      7ff8f6983c789f78f67063745fef92040bb5cb88463e82f6a9f05ba0b48021bd2c541cec6e06726748547f0800abd14dd52fe798feddcb1427a46b87619a4f00

    • SSDEEP

      24576:2TbBv5rUyXV0VTney9cyQJMA+b3iE0nHA6E:IBJgTney9clmA+b3KHe

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks