General

  • Target

    f4ab048f183a7269468b0cb8509668831e3d8f816e1be3162a0734c83c488c97.exe

  • Size

    1.1MB

  • Sample

    240705-cd89wsscke

  • MD5

    829cab70d17eaedeabe77c32154d11f2

  • SHA1

    196c898abee483229f61342ac1f8248677f833da

  • SHA256

    f4ab048f183a7269468b0cb8509668831e3d8f816e1be3162a0734c83c488c97

  • SHA512

    9d7ce634639d86cf020d1ce1a85e7c7d113feed2d0fc98f1f5ebb233ba77129e133b92636864bdbf105ec5599143f84835219203173bcf63ce047a7d40a7f4c3

  • SSDEEP

    24576:Y2G/nvxW3W4kqExbb2uM2bowf751JKeqkTsRPns:YbA34qQUwf75bz

Malware Config

Targets

    • Target

      f4ab048f183a7269468b0cb8509668831e3d8f816e1be3162a0734c83c488c97.exe

    • Size

      1.1MB

    • MD5

      829cab70d17eaedeabe77c32154d11f2

    • SHA1

      196c898abee483229f61342ac1f8248677f833da

    • SHA256

      f4ab048f183a7269468b0cb8509668831e3d8f816e1be3162a0734c83c488c97

    • SHA512

      9d7ce634639d86cf020d1ce1a85e7c7d113feed2d0fc98f1f5ebb233ba77129e133b92636864bdbf105ec5599143f84835219203173bcf63ce047a7d40a7f4c3

    • SSDEEP

      24576:Y2G/nvxW3W4kqExbb2uM2bowf751JKeqkTsRPns:YbA34qQUwf75bz

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks