General

  • Target

    5b74fabd26372fb02de33316f41adba1dd5d9e0c84961699cf2f9a475729b598

  • Size

    2.1MB

  • Sample

    220520-3ay8magee5

  • MD5

    cd41c9fd80fc79506911ae3a97676eb6

  • SHA1

    8a53a31dabf4c6bc373d6d83b75723e1eae1a384

  • SHA256

    5b74fabd26372fb02de33316f41adba1dd5d9e0c84961699cf2f9a475729b598

  • SHA512

    6d1657a837906d61d1a48fea8b1397bdbf638954981b4f519a4ba62ef27ba974467d886832d4b56ff09029193553bb21cc48af37c3111391734c0030e5cb443a

Malware Config

Targets

    • Target

      5b74fabd26372fb02de33316f41adba1dd5d9e0c84961699cf2f9a475729b598

    • Size

      2.1MB

    • MD5

      cd41c9fd80fc79506911ae3a97676eb6

    • SHA1

      8a53a31dabf4c6bc373d6d83b75723e1eae1a384

    • SHA256

      5b74fabd26372fb02de33316f41adba1dd5d9e0c84961699cf2f9a475729b598

    • SHA512

      6d1657a837906d61d1a48fea8b1397bdbf638954981b4f519a4ba62ef27ba974467d886832d4b56ff09029193553bb21cc48af37c3111391734c0030e5cb443a

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • suricata: ET MALWARE DCRat Initial CnC Activity

      suricata: ET MALWARE DCRat Initial CnC Activity

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks