General

  • Target

    6a8dc0383ff9426d3cd10e686ea8af6e.bin

  • Size

    1.3MB

  • Sample

    240701-cl4pdawfkj

  • MD5

    1da70de9626a5465aa9a7742b17f5668

  • SHA1

    def2bfbfa0682a4cc3941cea9975847925165350

  • SHA256

    90f985d62db63646b12c29fa073ddcf685fa3118e6fe1ac7b6ea7f5c240e9594

  • SHA512

    c850aea5cf175f567bc496b63d6066450c1618e0e19d2493442fda0242200ddd602696895dec6aeb90b147abdadcaa4d061e9c3f77d8c38e24c36fd5866d60f3

  • SSDEEP

    24576:ED1BqlBrlpQ2pV0HmB3LGA+f3PgH4uOiZvlBJraDLXHFiyXstp1f:ED63pppVLNGA+/4Vjv9ra/Eyif

Malware Config

Targets

    • Target

      258424cd8a701639a5ba89800e9e425463ab6219ce8435a37ea3c28b9b181ffa.exe

    • Size

      1.7MB

    • MD5

      6a8dc0383ff9426d3cd10e686ea8af6e

    • SHA1

      bee7864ec1d04b30f37d46da8e7ec5fe240ae3fc

    • SHA256

      258424cd8a701639a5ba89800e9e425463ab6219ce8435a37ea3c28b9b181ffa

    • SHA512

      f0d96a682995d5d8e965aea6efc041ea26d57b50de7e8d8c36d03a5b74c68321574ac955a7be70d1436cdeba94dacee41e0269308e799770aa064a0d7d29ddfa

    • SSDEEP

      24576:WwtlgjpoyMl1W9Rl/3XF9R95g9f53Lv+6gJUHGHhuf9QkGuW+4HcWb1JB4nS:xtyotW9RN+f53i1JUHG4xGuDkcY1JB

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks