General

  • Target

    321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3

  • Size

    952KB

  • Sample

    250127-zyqplswlhm

  • MD5

    67bc5be56b004a9b0b0e0f4cf3943591

  • SHA1

    ac567e17856fd4b06290d6383472b15b93175cc1

  • SHA256

    321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3

  • SHA512

    0c0699650cbd2d9ecbb8d607df7deef51078a7bd8fa31e28fe86a16dbfc3c72322ca16f8109b33f0c7d84878b37e6dcc49be9320a2281883cef8c43c361dec2a

  • SSDEEP

    24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

Malware Config

Targets

    • Target

      321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3

    • Size

      952KB

    • MD5

      67bc5be56b004a9b0b0e0f4cf3943591

    • SHA1

      ac567e17856fd4b06290d6383472b15b93175cc1

    • SHA256

      321107b1a9dc78b8423ea89958b0d7fb31866f74b3ff1c42c0b4884246a6dfb3

    • SHA512

      0c0699650cbd2d9ecbb8d607df7deef51078a7bd8fa31e28fe86a16dbfc3c72322ca16f8109b33f0c7d84878b37e6dcc49be9320a2281883cef8c43c361dec2a

    • SSDEEP

      24576:2+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:R8/KfRTK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks