General

  • Target

    49c7d4016f145f65ce5ddce7713e0f838aaeaf385d9d1b82b6dfd9dce059dc9b

  • Size

    2.1MB

  • Sample

    250204-176mvsvpas

  • MD5

    f1dcab3b0b9b874994fd1520921dfdd3

  • SHA1

    c6adbe69cdebca1b53708fe81cd19857df095f16

  • SHA256

    49c7d4016f145f65ce5ddce7713e0f838aaeaf385d9d1b82b6dfd9dce059dc9b

  • SHA512

    8aaf78e777f3a2deb44839d03c5a290dcc3c0990fefbd2b33969ca84e816ba78b0d728241a4726bdf24a720670830e1471db10bf904c1e33a9debd407013b76e

  • SSDEEP

    24576:8eMmYWdKdi2PgbIPUXWv4nNEilaY8/VTbB02FmPr7RbJliYLghWg4LpmFzmy89wa:8r89N8/VTbq9ziYLuELpZKT5Ev

Malware Config

Targets

    • Target

      49c7d4016f145f65ce5ddce7713e0f838aaeaf385d9d1b82b6dfd9dce059dc9b

    • Size

      2.1MB

    • MD5

      f1dcab3b0b9b874994fd1520921dfdd3

    • SHA1

      c6adbe69cdebca1b53708fe81cd19857df095f16

    • SHA256

      49c7d4016f145f65ce5ddce7713e0f838aaeaf385d9d1b82b6dfd9dce059dc9b

    • SHA512

      8aaf78e777f3a2deb44839d03c5a290dcc3c0990fefbd2b33969ca84e816ba78b0d728241a4726bdf24a720670830e1471db10bf904c1e33a9debd407013b76e

    • SSDEEP

      24576:8eMmYWdKdi2PgbIPUXWv4nNEilaY8/VTbB02FmPr7RbJliYLghWg4LpmFzmy89wa:8r89N8/VTbq9ziYLuELpZKT5Ev

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks