General

  • Target

    bdd142d15da530d8251259bd34d1881cd29f15722de7d89c91420380eceb09bb.exe

  • Size

    1.9MB

  • Sample

    250205-hvflssvqh1

  • MD5

    4faf68efc683ae3b08fea9e3e3cc98bc

  • SHA1

    8ecfdee378eaf44d57dd828be621805ed658719a

  • SHA256

    bdd142d15da530d8251259bd34d1881cd29f15722de7d89c91420380eceb09bb

  • SHA512

    aeb5fde2b04512f163ff0f17a8b31f64802271bf7a601a8555f184b9984dcc5812fc57932b4e3121cbf8fc29b0ccbb18ab5dd87c3e1dd17fc51cf8a2c3f60706

  • SSDEEP

    49152:0F87R2Jr74nDifdT8jWq4Da46sFtndKbbhI:0FVcnLjhtOtnYxI

Malware Config

Targets

    • Target

      bdd142d15da530d8251259bd34d1881cd29f15722de7d89c91420380eceb09bb.exe

    • Size

      1.9MB

    • MD5

      4faf68efc683ae3b08fea9e3e3cc98bc

    • SHA1

      8ecfdee378eaf44d57dd828be621805ed658719a

    • SHA256

      bdd142d15da530d8251259bd34d1881cd29f15722de7d89c91420380eceb09bb

    • SHA512

      aeb5fde2b04512f163ff0f17a8b31f64802271bf7a601a8555f184b9984dcc5812fc57932b4e3121cbf8fc29b0ccbb18ab5dd87c3e1dd17fc51cf8a2c3f60706

    • SSDEEP

      49152:0F87R2Jr74nDifdT8jWq4Da46sFtndKbbhI:0FVcnLjhtOtnYxI

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks