General

  • Target

    WinAuthx32.exe

  • Size

    1.1MB

  • Sample

    250327-q4hfravmt2

  • MD5

    d2f9a2c6cecae6184fd12f0fca835433

  • SHA1

    81030ac06f16d76cb4204963923cdf2f27913714

  • SHA256

    291d5441b266bfbd219043a3b9ac484525e79911792fba2d8401cba0207d9d0e

  • SHA512

    93392e8c1f7fb5b1e3cfab92ec1eceee3eabc3db73eadcbfb9c0cc2bef87ea5fb0f035c389b7af243df9020673156b0473cb6edc8d5c71ce3e9c4e2110e08150

  • SSDEEP

    24576:u2G/nvxW3WieCqgt5UOOs7sxXfmRm+vBhx5dv:ubA3j75JsK3x3

Malware Config

Targets

    • Target

      WinAuthx32.exe

    • Size

      1.1MB

    • MD5

      d2f9a2c6cecae6184fd12f0fca835433

    • SHA1

      81030ac06f16d76cb4204963923cdf2f27913714

    • SHA256

      291d5441b266bfbd219043a3b9ac484525e79911792fba2d8401cba0207d9d0e

    • SHA512

      93392e8c1f7fb5b1e3cfab92ec1eceee3eabc3db73eadcbfb9c0cc2bef87ea5fb0f035c389b7af243df9020673156b0473cb6edc8d5c71ce3e9c4e2110e08150

    • SSDEEP

      24576:u2G/nvxW3WieCqgt5UOOs7sxXfmRm+vBhx5dv:ubA3j75JsK3x3

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks