General

  • Target

    OOBebroker.exe

  • Size

    2.2MB

  • Sample

    250330-zvpyxayrw2

  • MD5

    c6e4d3fbc193ee034b6ce5b9d2c887b8

  • SHA1

    e2e3037e1b8c20978968b566092729ef823fc64b

  • SHA256

    9d69a62619e5bbe6246ab771b5c839903e0e986438cc26e1bd9a6706c1a9c4ca

  • SHA512

    e7995c6eccecaba8e95abd24eb699a280d57481adb837f8c838157a4eb9b883a0f27fb68ab664c0effdd3a1ab4351193a1ec52f41784caf0b5bc2ef970680b8e

  • SSDEEP

    24576:2TbBv5rUyXVpQ9RcjwzxTSkYsr7zUWgwdha8Tu0C61swPWM1KkNvgA5X9pBHN/ZY:IBJWh9+kjgwdhw16/WM1pNgCX9zVhJ4X

Malware Config

Targets

    • Target

      OOBebroker.exe

    • Size

      2.2MB

    • MD5

      c6e4d3fbc193ee034b6ce5b9d2c887b8

    • SHA1

      e2e3037e1b8c20978968b566092729ef823fc64b

    • SHA256

      9d69a62619e5bbe6246ab771b5c839903e0e986438cc26e1bd9a6706c1a9c4ca

    • SHA512

      e7995c6eccecaba8e95abd24eb699a280d57481adb837f8c838157a4eb9b883a0f27fb68ab664c0effdd3a1ab4351193a1ec52f41784caf0b5bc2ef970680b8e

    • SSDEEP

      24576:2TbBv5rUyXVpQ9RcjwzxTSkYsr7zUWgwdha8Tu0C61swPWM1KkNvgA5X9pBHN/ZY:IBJWh9+kjgwdhw16/WM1pNgCX9zVhJ4X

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks