General

  • Target

    DCRat Crack Test VERSION.exe

  • Size

    3.7MB

  • Sample

    230403-v5pzfagb67

  • MD5

    0cf54aebcc76f09c147863b916a494fc

  • SHA1

    5a41a7060f20f4bc16ba4a60c8f22aa16495cb3e

  • SHA256

    0cac16b9e6b85c3415ebc63def32b4bc999182a7a09197afdcf0851f57aae68d

  • SHA512

    8dc0c4fe4649523e155bf7c57ceccb70524b27a18374e4e5fa1b991ad322181dca131b99729926f9d54dd3a1c1f86fdb40607a4e9790d0acceef2e116ba4712e

  • SSDEEP

    98304:OavNz0cqlVkGIgKuP04hZ9gA2aT3v9f8473v0H:OUNYcqMGIgdrgfaT/p8S3v0H

Malware Config

Targets

    • Target

      DCRat Crack Test VERSION.exe

    • Size

      3.7MB

    • MD5

      0cf54aebcc76f09c147863b916a494fc

    • SHA1

      5a41a7060f20f4bc16ba4a60c8f22aa16495cb3e

    • SHA256

      0cac16b9e6b85c3415ebc63def32b4bc999182a7a09197afdcf0851f57aae68d

    • SHA512

      8dc0c4fe4649523e155bf7c57ceccb70524b27a18374e4e5fa1b991ad322181dca131b99729926f9d54dd3a1c1f86fdb40607a4e9790d0acceef2e116ba4712e

    • SSDEEP

      98304:OavNz0cqlVkGIgKuP04hZ9gA2aT3v9f8473v0H:OUNYcqMGIgdrgfaT/p8S3v0H

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks