General

  • Target

    4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd.exe

  • Size

    952KB

  • Sample

    250125-jgyqwsspaz

  • MD5

    0ebb2d19c8a22a1a31f2088164233d7c

  • SHA1

    ba880d1df17a566198ed16f91ae16126c9103a40

  • SHA256

    4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd

  • SHA512

    373f71389e03747a73ef5d02ba998cea4f60eb718af44bce83def2395c1fbcaf99bacf78b9fc79eea9c24018a81864a17cfb81bbe8462d8eb9e6b4874b56fdb5

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXu:R8/KfRTKM

Malware Config

Targets

    • Target

      4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd.exe

    • Size

      952KB

    • MD5

      0ebb2d19c8a22a1a31f2088164233d7c

    • SHA1

      ba880d1df17a566198ed16f91ae16126c9103a40

    • SHA256

      4d68ce61047c125e3537ec992fd0a6a156bf64f21aa1c55c909aedf5871fe2cd

    • SHA512

      373f71389e03747a73ef5d02ba998cea4f60eb718af44bce83def2395c1fbcaf99bacf78b9fc79eea9c24018a81864a17cfb81bbe8462d8eb9e6b4874b56fdb5

    • SSDEEP

      24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXXu:R8/KfRTKM

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks