General

  • Target

    b95114a8ca94a3a7a191d460a6922b40eacf8a8afe7e217052e6ad97f62d8c64N.exe

  • Size

    1.9MB

  • Sample

    250205-gtw2qatkbs

  • MD5

    5a1d8a0bc5a402a2fbc17c1dd6bc62a0

  • SHA1

    bba1b92394a84353f709cc01de16a04fde3a10be

  • SHA256

    b95114a8ca94a3a7a191d460a6922b40eacf8a8afe7e217052e6ad97f62d8c64

  • SHA512

    8cc6795c169536276e9ea7a027eb643beffa414a60e380d9debffeaa76ee349707a24e5c5af50ea968d8808c55a32a147201e0998e5dd655db8881722674c3a5

  • SSDEEP

    49152:0F87R2Jr74nDifdT8jWq4Da46sFtndKbbh:0FVcnLjhtOtnYx

Malware Config

Targets

    • Target

      b95114a8ca94a3a7a191d460a6922b40eacf8a8afe7e217052e6ad97f62d8c64N.exe

    • Size

      1.9MB

    • MD5

      5a1d8a0bc5a402a2fbc17c1dd6bc62a0

    • SHA1

      bba1b92394a84353f709cc01de16a04fde3a10be

    • SHA256

      b95114a8ca94a3a7a191d460a6922b40eacf8a8afe7e217052e6ad97f62d8c64

    • SHA512

      8cc6795c169536276e9ea7a027eb643beffa414a60e380d9debffeaa76ee349707a24e5c5af50ea968d8808c55a32a147201e0998e5dd655db8881722674c3a5

    • SSDEEP

      49152:0F87R2Jr74nDifdT8jWq4Da46sFtndKbbh:0FVcnLjhtOtnYx

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks