General

  • Target

    c51e336ccce286f7dc77f757453b758a.exe

  • Size

    3.2MB

  • Sample

    250208-l4n63sykaw

  • MD5

    c51e336ccce286f7dc77f757453b758a

  • SHA1

    7f417599de5435e88a6088e4ce3cf427ec4f7114

  • SHA256

    87b0a9e1d76ecaff218f701b021e0e068d230afb10173f52d292906937cd61d3

  • SHA512

    97d8668b383f88422286bccb4440abafa7881b00c2a7dc801e50af9a125b362b918a37b3ac481c1b95c72987bf6a017c649319c336cc4a0fc9f8f44a1efa976d

  • SSDEEP

    24576:nr3wZURPUxmbXPKbzZzKglPxkDX8UUz8AYdps+c5m9+ATIir683R+bNwoDlVF:nEZFmb4gglZWrzs+cIw2683sbuoD

Malware Config

Targets

    • Target

      c51e336ccce286f7dc77f757453b758a.exe

    • Size

      3.2MB

    • MD5

      c51e336ccce286f7dc77f757453b758a

    • SHA1

      7f417599de5435e88a6088e4ce3cf427ec4f7114

    • SHA256

      87b0a9e1d76ecaff218f701b021e0e068d230afb10173f52d292906937cd61d3

    • SHA512

      97d8668b383f88422286bccb4440abafa7881b00c2a7dc801e50af9a125b362b918a37b3ac481c1b95c72987bf6a017c649319c336cc4a0fc9f8f44a1efa976d

    • SSDEEP

      24576:nr3wZURPUxmbXPKbzZzKglPxkDX8UUz8AYdps+c5m9+ATIir683R+bNwoDlVF:nEZFmb4gglZWrzs+cIw2683sbuoD

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks