General

  • Target

    08aa2d466ba6309aa9395b0a5ef0af543aed33270a65ed397401e35fa3ba7fe7_JC.exe

  • Size

    1.1MB

  • Sample

    231003-q9ebaada82

  • MD5

    0a58202c976291d628df312bcd090e5e

  • SHA1

    d8b5759fde291c74e38a405c1dcc1f6cfa22fa63

  • SHA256

    08aa2d466ba6309aa9395b0a5ef0af543aed33270a65ed397401e35fa3ba7fe7

  • SHA512

    e98f581fa1e22538dd4b271480319f6d9fe7ef7544f9d5b508d18c202329f0d63805a3fe476d97d249b370f7ea3e4353de2d2099b64c5a707af229c86cf512fd

  • SSDEEP

    12288:El+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btU:Zyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f

Malware Config

Targets

    • Target

      08aa2d466ba6309aa9395b0a5ef0af543aed33270a65ed397401e35fa3ba7fe7_JC.exe

    • Size

      1.1MB

    • MD5

      0a58202c976291d628df312bcd090e5e

    • SHA1

      d8b5759fde291c74e38a405c1dcc1f6cfa22fa63

    • SHA256

      08aa2d466ba6309aa9395b0a5ef0af543aed33270a65ed397401e35fa3ba7fe7

    • SHA512

      e98f581fa1e22538dd4b271480319f6d9fe7ef7544f9d5b508d18c202329f0d63805a3fe476d97d249b370f7ea3e4353de2d2099b64c5a707af229c86cf512fd

    • SSDEEP

      12288:El+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btU:Zyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks