General

  • Target

    1054af5e9206aa0cb650a4e58900bcd369a554e64eaa89f56cb35cd105386eb5.exe

  • Size

    829KB

  • Sample

    250114-cjzyeawlfn

  • MD5

    c1f1bea182f1c3477c2f133c3ac26930

  • SHA1

    2145c09d2c3279ac83e844c4d80e7aa219e99b8d

  • SHA256

    1054af5e9206aa0cb650a4e58900bcd369a554e64eaa89f56cb35cd105386eb5

  • SHA512

    6af6336782b29bdab906e4d289cb5c2c8500ba8a20dee53def21960e62afc28ec6756b746b4e4036a30726984a60b656b3d529b4abc119953267e91be4992a4d

  • SSDEEP

    12288:P6TnOzi5kaag8hpT77JJMA+XSpW3Ari4VVyZC0+1cw2jINof7+vEnkdsOZ6:P6TnYa+T7dJMA+i3iE0nHfW6

Malware Config

Targets

    • Target

      1054af5e9206aa0cb650a4e58900bcd369a554e64eaa89f56cb35cd105386eb5.exe

    • Size

      829KB

    • MD5

      c1f1bea182f1c3477c2f133c3ac26930

    • SHA1

      2145c09d2c3279ac83e844c4d80e7aa219e99b8d

    • SHA256

      1054af5e9206aa0cb650a4e58900bcd369a554e64eaa89f56cb35cd105386eb5

    • SHA512

      6af6336782b29bdab906e4d289cb5c2c8500ba8a20dee53def21960e62afc28ec6756b746b4e4036a30726984a60b656b3d529b4abc119953267e91be4992a4d

    • SSDEEP

      12288:P6TnOzi5kaag8hpT77JJMA+XSpW3Ari4VVyZC0+1cw2jINof7+vEnkdsOZ6:P6TnYa+T7dJMA+i3iE0nHfW6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks