General

  • Target

    cf40b5e2332d76b97a1a1a18f89b68ef.exe

  • Size

    769KB

  • Sample

    250206-s7p14s1mar

  • MD5

    cf40b5e2332d76b97a1a1a18f89b68ef

  • SHA1

    2c352c7e4521570c3cd7c99a35b715feed866f03

  • SHA256

    e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272

  • SHA512

    27ac673faa2306c572a5600195c08c875c47892df513547cfba91674e37fdd0876c2344662c81ecf00a0b3bbe515e07696b248f64e1221bec4398b3b1cff7f9a

  • SSDEEP

    12288:CvTnXW/cYwVIB/6f/iJJMA+opW3Ari4VVyZC0+1ctHNt8KF4AXDYZ6:CvTn2whf/MJMA+o3iE0n3a6

Malware Config

Targets

    • Target

      cf40b5e2332d76b97a1a1a18f89b68ef.exe

    • Size

      769KB

    • MD5

      cf40b5e2332d76b97a1a1a18f89b68ef

    • SHA1

      2c352c7e4521570c3cd7c99a35b715feed866f03

    • SHA256

      e2fbb2295fdaf8d692657bb330682117c536f5b04c3ee0afdf70a8541a27f272

    • SHA512

      27ac673faa2306c572a5600195c08c875c47892df513547cfba91674e37fdd0876c2344662c81ecf00a0b3bbe515e07696b248f64e1221bec4398b3b1cff7f9a

    • SSDEEP

      12288:CvTnXW/cYwVIB/6f/iJJMA+opW3Ari4VVyZC0+1ctHNt8KF4AXDYZ6:CvTn2whf/MJMA+o3iE0n3a6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks