General

  • Target

    7a982ed5fcffafc6772a4694fad27694b6cacff8e30698cec33bf4f41f91a57a.exe

  • Size

    2.5MB

  • Sample

    250202-e5ynksxlcr

  • MD5

    726f633190773a11aba4d20bc1d28fe3

  • SHA1

    3d3fe6242f7a23c15913a0b6e0ebdcb5fee97c7c

  • SHA256

    7a982ed5fcffafc6772a4694fad27694b6cacff8e30698cec33bf4f41f91a57a

  • SHA512

    89fedb3eeec1973fbceff58067410fef7af38de16aa00ef9cf854b404844cb14865be6cb08d806fb66c390ae019952a7c4400d138a51ff7dd78ccffa69bb6d98

  • SSDEEP

    49152:3nBJ/gmNwH6zpk2N2ggey84Y4g04NFRgNdmP/f55+L9N+9TUEq:RZnaHe+w2gryzSjqdYB0v+9G

Malware Config

Targets

    • Target

      7a982ed5fcffafc6772a4694fad27694b6cacff8e30698cec33bf4f41f91a57a.exe

    • Size

      2.5MB

    • MD5

      726f633190773a11aba4d20bc1d28fe3

    • SHA1

      3d3fe6242f7a23c15913a0b6e0ebdcb5fee97c7c

    • SHA256

      7a982ed5fcffafc6772a4694fad27694b6cacff8e30698cec33bf4f41f91a57a

    • SHA512

      89fedb3eeec1973fbceff58067410fef7af38de16aa00ef9cf854b404844cb14865be6cb08d806fb66c390ae019952a7c4400d138a51ff7dd78ccffa69bb6d98

    • SSDEEP

      49152:3nBJ/gmNwH6zpk2N2ggey84Y4g04NFRgNdmP/f55+L9N+9TUEq:RZnaHe+w2gryzSjqdYB0v+9G

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks