General

  • Target

    e1f91dd1eda7bceaffca238ec26a4226dc7ab8b37260d5dea2e5700f7a038970

  • Size

    1.5MB

  • Sample

    250128-ewyxzsxjcs

  • MD5

    19d9a08825aa6caf9eb842eff80964cc

  • SHA1

    e2d3e68847540e9911b5794d7f405e7e2306c4f7

  • SHA256

    e1f91dd1eda7bceaffca238ec26a4226dc7ab8b37260d5dea2e5700f7a038970

  • SHA512

    46cd84d8412d19baf1cd484fb9fd8de8ef32b67be5a9573a84d17df60e3ab5bde34cdefead852bd3840ca29610b252d940bbc5387022a90c6e7bbe5bdc2bb370

  • SSDEEP

    24576:0NNUtQhWhtqDfDXQdy+N+gfQqRsgFlDRluQ70eJiVbWpR:EzhWhCXQFN+0IEuQgyiVK

Malware Config

Targets

    • Target

      e1f91dd1eda7bceaffca238ec26a4226dc7ab8b37260d5dea2e5700f7a038970

    • Size

      1.5MB

    • MD5

      19d9a08825aa6caf9eb842eff80964cc

    • SHA1

      e2d3e68847540e9911b5794d7f405e7e2306c4f7

    • SHA256

      e1f91dd1eda7bceaffca238ec26a4226dc7ab8b37260d5dea2e5700f7a038970

    • SHA512

      46cd84d8412d19baf1cd484fb9fd8de8ef32b67be5a9573a84d17df60e3ab5bde34cdefead852bd3840ca29610b252d940bbc5387022a90c6e7bbe5bdc2bb370

    • SSDEEP

      24576:0NNUtQhWhtqDfDXQdy+N+gfQqRsgFlDRluQ70eJiVbWpR:EzhWhCXQFN+0IEuQgyiVK

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks