General

  • Target

    start.bat

  • Size

    2.1MB

  • Sample

    250328-h4mrgaszh1

  • MD5

    f24113636f3fd1063f16a19f9489cc55

  • SHA1

    6baa1db9977bbe6fa55bca875d522504cdaeb154

  • SHA256

    3aab7bd206cf53de3f64cd09bb5dcef88a5e48461a50c798a4a11b623506c976

  • SHA512

    046bebc64a1545b03586b2ecb2deba48245432242d494599a6ba120970197156ede33588013913084e1d297b6ab818eb9df586b1770d2c5a9a1b234b1ab9d469

  • SSDEEP

    24576:2TbBv5rUyXVm9US2Qh9vbixa8FAPOZEl2dQE98Kt7fgZizgXVWA1CiFoe9+Qoi81:IBJm9LPOIK5ui8pciKi+QoW3wD9aFuH

Malware Config

Targets

    • Target

      start.bat

    • Size

      2.1MB

    • MD5

      f24113636f3fd1063f16a19f9489cc55

    • SHA1

      6baa1db9977bbe6fa55bca875d522504cdaeb154

    • SHA256

      3aab7bd206cf53de3f64cd09bb5dcef88a5e48461a50c798a4a11b623506c976

    • SHA512

      046bebc64a1545b03586b2ecb2deba48245432242d494599a6ba120970197156ede33588013913084e1d297b6ab818eb9df586b1770d2c5a9a1b234b1ab9d469

    • SSDEEP

      24576:2TbBv5rUyXVm9US2Qh9vbixa8FAPOZEl2dQE98Kt7fgZizgXVWA1CiFoe9+Qoi81:IBJm9LPOIK5ui8pciKi+QoW3wD9aFuH

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks