General

  • Target

    77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845

  • Size

    2.2MB

  • Sample

    250122-d2ynqswqdk

  • MD5

    4456822b2b827ac37495bd31b427a67a

  • SHA1

    201a118a38334aa4d971753dee890f2d15777c46

  • SHA256

    77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845

  • SHA512

    cb1e84f52bc25984422981e6c3b76ad2c3eebe895434a677ebdac9a676eeb4c46b1e1aed43161e4a3c4ba0a16da764d8f3b5d5823cb99f2d934738f1478e4213

  • SSDEEP

    49152:631tZUmbFNH1wLJDPqTo9lIS/MXU2F4/1l5eQ7K6:6ltZUE6NDyTo9lv2F+VvK6

Malware Config

Targets

    • Target

      77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845

    • Size

      2.2MB

    • MD5

      4456822b2b827ac37495bd31b427a67a

    • SHA1

      201a118a38334aa4d971753dee890f2d15777c46

    • SHA256

      77416f272b5f9f86a13038caf163f2a2a7c65e4e0281e43cbd745ebff9256845

    • SHA512

      cb1e84f52bc25984422981e6c3b76ad2c3eebe895434a677ebdac9a676eeb4c46b1e1aed43161e4a3c4ba0a16da764d8f3b5d5823cb99f2d934738f1478e4213

    • SSDEEP

      49152:631tZUmbFNH1wLJDPqTo9lIS/MXU2F4/1l5eQ7K6:6ltZUE6NDyTo9lv2F+VvK6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks