General

  • Target

    78435CC9FF6476DC08A846278E5660D9.exe

  • Size

    3.4MB

  • Sample

    250521-jpfv2sfr31

  • MD5

    78435cc9ff6476dc08a846278e5660d9

  • SHA1

    d1b80970a48d5a33a2caafa78506aec90bb57d4a

  • SHA256

    3e30a2cf92118181935d352e015091560d00e0de7ec76d5f3e42c5f89b346dda

  • SHA512

    0bc25ebb5c794d83dc482808801d66f5a9d15dd4cb8b3bcd2e8599e720473f0ef7a03e330937ce428203151581ce6e0faf2f72d50c717927696dcfab240a2bbd

  • SSDEEP

    49152:IBJcesUucZHM77jh2wz5Au6AR3cNUDcv7KSzrK/pEo0rgJlIXIbf48:y+esUusUJ2wJ6AR3fDcvGOriLagIYbfv

Malware Config

Targets

    • Target

      78435CC9FF6476DC08A846278E5660D9.exe

    • Size

      3.4MB

    • MD5

      78435cc9ff6476dc08a846278e5660d9

    • SHA1

      d1b80970a48d5a33a2caafa78506aec90bb57d4a

    • SHA256

      3e30a2cf92118181935d352e015091560d00e0de7ec76d5f3e42c5f89b346dda

    • SHA512

      0bc25ebb5c794d83dc482808801d66f5a9d15dd4cb8b3bcd2e8599e720473f0ef7a03e330937ce428203151581ce6e0faf2f72d50c717927696dcfab240a2bbd

    • SSDEEP

      49152:IBJcesUucZHM77jh2wz5Au6AR3cNUDcv7KSzrK/pEo0rgJlIXIbf48:y+esUusUJ2wJ6AR3fDcvGOriLagIYbfv

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »