General

  • Target

    Launcher.exe

  • Size

    1.9MB

  • Sample

    250327-jlgyya1mw2

  • MD5

    fc06b895d807fd63de36914ddf278cd9

  • SHA1

    3fc5e6bfaba1adfb44a5e2af8f6350b0f292b57c

  • SHA256

    82e3832d52413d37e20a7dc822ed59bbec29927716f5a9c8e90f1e710c744b82

  • SHA512

    fbf1b1a0c0a3175f4162e89b7285ead314770934767333bae5c60db0ecf0799e9ee3667ddb966b27367b45a2a4151ea4d4af43efdcfbf84828b86ef0fc3867a0

  • SSDEEP

    49152:4p5fMbCt/PzfzpLzE+0X4XncPdQfukH7W9GHI/Dd5B5:8f+C1PzLpEnIXndG27iV/DHB

Malware Config

Targets

    • Target

      Launcher.exe

    • Size

      1.9MB

    • MD5

      fc06b895d807fd63de36914ddf278cd9

    • SHA1

      3fc5e6bfaba1adfb44a5e2af8f6350b0f292b57c

    • SHA256

      82e3832d52413d37e20a7dc822ed59bbec29927716f5a9c8e90f1e710c744b82

    • SHA512

      fbf1b1a0c0a3175f4162e89b7285ead314770934767333bae5c60db0ecf0799e9ee3667ddb966b27367b45a2a4151ea4d4af43efdcfbf84828b86ef0fc3867a0

    • SSDEEP

      49152:4p5fMbCt/PzfzpLzE+0X4XncPdQfukH7W9GHI/Dd5B5:8f+C1PzLpEnIXndG27iV/DHB

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks