General

  • Target

    c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96eN.exe

  • Size

    952KB

  • Sample

    250125-pyex1atjcs

  • MD5

    d34faac709c42364e40c0dce2e1d8e30

  • SHA1

    db6740044a2f829a5a0063e3eaf8e21902cf56b3

  • SHA256

    c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96e

  • SHA512

    093f1046fccad9566a6a5453afaec3f228e59598db69adc9a75665bd94cd81462bc87f392dbb2a59452d78ee8a0f6a0f30088d708bb750005b4c923fcf03403c

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Targets

    • Target

      c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96eN.exe

    • Size

      952KB

    • MD5

      d34faac709c42364e40c0dce2e1d8e30

    • SHA1

      db6740044a2f829a5a0063e3eaf8e21902cf56b3

    • SHA256

      c79981b0074ac288d065d459de654d9b7003f625d76526211805decdaa94f96e

    • SHA512

      093f1046fccad9566a6a5453afaec3f228e59598db69adc9a75665bd94cd81462bc87f392dbb2a59452d78ee8a0f6a0f30088d708bb750005b4c923fcf03403c

    • SSDEEP

      24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks