General

  • Target

    7afbf498fc56475c7960c67595374fc5d84235b381ac1193bd4ebefa3ed0e033.exe

  • Size

    10.0MB

  • Sample

    230323-fft5jafe5t

  • MD5

    718c1a4f0cdacf94d4d6ad97e06a459f

  • SHA1

    f7ea9a4f39e415c15ef563ecd4f381013e52d3a7

  • SHA256

    7afbf498fc56475c7960c67595374fc5d84235b381ac1193bd4ebefa3ed0e033

  • SHA512

    8a3d55db0a4eae644922895e140269f22f8214af875bf3544255bcc1be6b1de9a1274b1dd41cc4ac5826a9ac5e1d8d216994891dc124c01ba722db214652f80e

  • SSDEEP

    196608:2JJ8G/X6v9189c+HzrMyU59NSOWQqA00aWOj/AoDvVq:2JJTCv8cEnMrrNSOhLPOj/Pv

Malware Config

Targets

    • Target

      7afbf498fc56475c7960c67595374fc5d84235b381ac1193bd4ebefa3ed0e033.exe

    • Size

      10.0MB

    • MD5

      718c1a4f0cdacf94d4d6ad97e06a459f

    • SHA1

      f7ea9a4f39e415c15ef563ecd4f381013e52d3a7

    • SHA256

      7afbf498fc56475c7960c67595374fc5d84235b381ac1193bd4ebefa3ed0e033

    • SHA512

      8a3d55db0a4eae644922895e140269f22f8214af875bf3544255bcc1be6b1de9a1274b1dd41cc4ac5826a9ac5e1d8d216994891dc124c01ba722db214652f80e

    • SSDEEP

      196608:2JJ8G/X6v9189c+HzrMyU59NSOWQqA00aWOj/AoDvVq:2JJTCv8cEnMrrNSOhLPOj/Pv

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks