General

  • Target

    258424cd8a701639a5ba89800e9e425463ab6219ce8435a37ea3c28b9b181ffa.exe

  • Size

    1.7MB

  • Sample

    240630-bfs51s1dnc

  • MD5

    6a8dc0383ff9426d3cd10e686ea8af6e

  • SHA1

    bee7864ec1d04b30f37d46da8e7ec5fe240ae3fc

  • SHA256

    258424cd8a701639a5ba89800e9e425463ab6219ce8435a37ea3c28b9b181ffa

  • SHA512

    f0d96a682995d5d8e965aea6efc041ea26d57b50de7e8d8c36d03a5b74c68321574ac955a7be70d1436cdeba94dacee41e0269308e799770aa064a0d7d29ddfa

  • SSDEEP

    24576:WwtlgjpoyMl1W9Rl/3XF9R95g9f53Lv+6gJUHGHhuf9QkGuW+4HcWb1JB4nS:xtyotW9RN+f53i1JUHG4xGuDkcY1JB

Malware Config

Targets

    • Target

      258424cd8a701639a5ba89800e9e425463ab6219ce8435a37ea3c28b9b181ffa.exe

    • Size

      1.7MB

    • MD5

      6a8dc0383ff9426d3cd10e686ea8af6e

    • SHA1

      bee7864ec1d04b30f37d46da8e7ec5fe240ae3fc

    • SHA256

      258424cd8a701639a5ba89800e9e425463ab6219ce8435a37ea3c28b9b181ffa

    • SHA512

      f0d96a682995d5d8e965aea6efc041ea26d57b50de7e8d8c36d03a5b74c68321574ac955a7be70d1436cdeba94dacee41e0269308e799770aa064a0d7d29ddfa

    • SSDEEP

      24576:WwtlgjpoyMl1W9Rl/3XF9R95g9f53Lv+6gJUHGHhuf9QkGuW+4HcWb1JB4nS:xtyotW9RN+f53i1JUHG4xGuDkcY1JB

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Detects executables packed with SmartAssembly

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks