General

  • Target

    21cad48edbc93da2d1e1ab6f6632461a.bin

  • Size

    6.8MB

  • Sample

    240701-bl3lms1hje

  • MD5

    21cad48edbc93da2d1e1ab6f6632461a

  • SHA1

    667a584eae5a57937d66d64249c26c8b1b2abf8f

  • SHA256

    32619382ab72416dff258bff30a8b505d6e69e818345612892a121c28f3b23b0

  • SHA512

    9125263a9b31336d350e19f9c79460038f7a6c48db109001e93fd8d7e8aba30c3bf44a362c4f3ee87294d3cf9052cbc8d7da518d34356212cb6f914a9990a21d

  • SSDEEP

    196608:UQKQUc/HMlS2JxmYcmcg7XGqb6Msq51GPo:XKwslSDVoXGe1GQ

Malware Config

Targets

    • Target

      21cad48edbc93da2d1e1ab6f6632461a.bin

    • Size

      6.8MB

    • MD5

      21cad48edbc93da2d1e1ab6f6632461a

    • SHA1

      667a584eae5a57937d66d64249c26c8b1b2abf8f

    • SHA256

      32619382ab72416dff258bff30a8b505d6e69e818345612892a121c28f3b23b0

    • SHA512

      9125263a9b31336d350e19f9c79460038f7a6c48db109001e93fd8d7e8aba30c3bf44a362c4f3ee87294d3cf9052cbc8d7da518d34356212cb6f914a9990a21d

    • SSDEEP

      196608:UQKQUc/HMlS2JxmYcmcg7XGqb6Msq51GPo:XKwslSDVoXGe1GQ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks