General

  • Target

    NEAS.08eb75af5d50ef3a4f602e90de74c660.exe

  • Size

    783KB

  • Sample

    231021-z2l6lacc54

  • MD5

    08eb75af5d50ef3a4f602e90de74c660

  • SHA1

    dd333a63bd79307e33d87540568f349a0681a9ce

  • SHA256

    2576badffe87c022f36d203a6553b657a56bc86ec8f3a044b83f8d9d761df0d2

  • SHA512

    36e7c9b512235588d21d6cb2197f297361580be434499b9aceccd3d7a24a33e0c60d28048add50a7129f57451f44fa49212174a2018eeb15b72b3442fe837a46

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Targets

    • Target

      NEAS.08eb75af5d50ef3a4f602e90de74c660.exe

    • Size

      783KB

    • MD5

      08eb75af5d50ef3a4f602e90de74c660

    • SHA1

      dd333a63bd79307e33d87540568f349a0681a9ce

    • SHA256

      2576badffe87c022f36d203a6553b657a56bc86ec8f3a044b83f8d9d761df0d2

    • SHA512

      36e7c9b512235588d21d6cb2197f297361580be434499b9aceccd3d7a24a33e0c60d28048add50a7129f57451f44fa49212174a2018eeb15b72b3442fe837a46

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks