General

  • Target

    79dd01cce6f984152a8e07f6bbc447387a355794bc717a1348644f8b57565a98.exe

  • Size

    1.6MB

  • Sample

    250114-c89h5svjez

  • MD5

    e4d5bf96ef8643dcfd7a7f54e572cf59

  • SHA1

    b80bc4046716b909a2f0692faef8d037a61cb9ee

  • SHA256

    79dd01cce6f984152a8e07f6bbc447387a355794bc717a1348644f8b57565a98

  • SHA512

    6704a1d6da446ab58717dc154180d817d4d3561a4e369d7f066421302c514950a51dd6104ec1e1b180488f7262c2bff00c02438aabc5e74e00e554e2290e1822

  • SSDEEP

    24576:yTbBv5rUTxMWorF6OswaKn31LdWnriW26/kSBn3vwof0XcpDAFsGo5kCfBC2MRy:UBaM3ZdjV4nri+FT0XPQLCBRy

Malware Config

Targets

    • Target

      79dd01cce6f984152a8e07f6bbc447387a355794bc717a1348644f8b57565a98.exe

    • Size

      1.6MB

    • MD5

      e4d5bf96ef8643dcfd7a7f54e572cf59

    • SHA1

      b80bc4046716b909a2f0692faef8d037a61cb9ee

    • SHA256

      79dd01cce6f984152a8e07f6bbc447387a355794bc717a1348644f8b57565a98

    • SHA512

      6704a1d6da446ab58717dc154180d817d4d3561a4e369d7f066421302c514950a51dd6104ec1e1b180488f7262c2bff00c02438aabc5e74e00e554e2290e1822

    • SSDEEP

      24576:yTbBv5rUTxMWorF6OswaKn31LdWnriW26/kSBn3vwof0XcpDAFsGo5kCfBC2MRy:UBaM3ZdjV4nri+FT0XPQLCBRy

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks