General

  • Target

    b786f31f1c89c71d0510bbd32510595d9891c67db516f968261b02594a423a8d.exe

  • Size

    3.2MB

  • Sample

    250114-dk69jsxmcj

  • MD5

    a7040b85fc683f088f4c6e5b44052c43

  • SHA1

    7e3d644d1a1fb7b9bcccb6406d2e7fbd062eae66

  • SHA256

    b786f31f1c89c71d0510bbd32510595d9891c67db516f968261b02594a423a8d

  • SHA512

    e225f6f7e114690aad25e9c67460e50f5b84cc8ca87a69ba94ff63ab42415df176a3ed6c3456cddb849927604a4888b17e5e781ac97d2ba0197f9687bbb2c301

  • SSDEEP

    98304:hb5Nf/dq7yqKM1TcGZ6gtq1/Lko4uVa8Nb:FMyqKM1TogtqT44NNb

Malware Config

Targets

    • Target

      b786f31f1c89c71d0510bbd32510595d9891c67db516f968261b02594a423a8d.exe

    • Size

      3.2MB

    • MD5

      a7040b85fc683f088f4c6e5b44052c43

    • SHA1

      7e3d644d1a1fb7b9bcccb6406d2e7fbd062eae66

    • SHA256

      b786f31f1c89c71d0510bbd32510595d9891c67db516f968261b02594a423a8d

    • SHA512

      e225f6f7e114690aad25e9c67460e50f5b84cc8ca87a69ba94ff63ab42415df176a3ed6c3456cddb849927604a4888b17e5e781ac97d2ba0197f9687bbb2c301

    • SSDEEP

      98304:hb5Nf/dq7yqKM1TcGZ6gtq1/Lko4uVa8Nb:FMyqKM1TogtqT44NNb

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks