General

  • Target

    1ebda5cfb762d7884f46792cb1d12adb.exe

  • Size

    8.0MB

  • Sample

    230323-23dlyscg4y

  • MD5

    1ebda5cfb762d7884f46792cb1d12adb

  • SHA1

    22f9c3c64dd3d13c2453a1872e3ad59491f6d101

  • SHA256

    bec2656a4413d2cb9d64f99d3b72472989197434a637ed136858ed782b293a50

  • SHA512

    ec700ceb9af2b0eea226d3f1f0b2ed46dfe60a0364f4b676f524db4d2a542db1eb961d466c59bb0e3a2fcbfc9521d8d354ac607c528b90ebd1787edd0126437a

  • SSDEEP

    196608:0PbgMfpayqnxbAQ5owejuJDUX47dwdW0vnFwBTYPERR+:KzYyoxCaUX47d4XnwZQ

Malware Config

Targets

    • Target

      1ebda5cfb762d7884f46792cb1d12adb.exe

    • Size

      8.0MB

    • MD5

      1ebda5cfb762d7884f46792cb1d12adb

    • SHA1

      22f9c3c64dd3d13c2453a1872e3ad59491f6d101

    • SHA256

      bec2656a4413d2cb9d64f99d3b72472989197434a637ed136858ed782b293a50

    • SHA512

      ec700ceb9af2b0eea226d3f1f0b2ed46dfe60a0364f4b676f524db4d2a542db1eb961d466c59bb0e3a2fcbfc9521d8d354ac607c528b90ebd1787edd0126437a

    • SSDEEP

      196608:0PbgMfpayqnxbAQ5owejuJDUX47dwdW0vnFwBTYPERR+:KzYyoxCaUX47d4XnwZQ

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks