General

  • Target

    NEAS.fad61576119f9f0e83a0f04704bab2f0.exe

  • Size

    1.4MB

  • Sample

    231103-l9qxvsga7x

  • MD5

    fad61576119f9f0e83a0f04704bab2f0

  • SHA1

    6bef3b913813986048e85850d7dd7e8c1bc7985b

  • SHA256

    a1db60576f72eb77c785e3af0d8df11f4f845606c7f33b69b2f385e2c26167f8

  • SHA512

    baa5d6a0edba5ed6f794bb8d9d9a1b036231f367a7d69ea5710d6f079b599017f867296c065184a28bf1c0a1e0899c723f1c8b8379d5478a82b9e1a83ca4b263

  • SSDEEP

    24576:qBBkOlRe8ZcXPuCyRdaN1yV/vELneAcCg8:uOOy8eEa1Jct8

Malware Config

Targets

    • Target

      NEAS.fad61576119f9f0e83a0f04704bab2f0.exe

    • Size

      1.4MB

    • MD5

      fad61576119f9f0e83a0f04704bab2f0

    • SHA1

      6bef3b913813986048e85850d7dd7e8c1bc7985b

    • SHA256

      a1db60576f72eb77c785e3af0d8df11f4f845606c7f33b69b2f385e2c26167f8

    • SHA512

      baa5d6a0edba5ed6f794bb8d9d9a1b036231f367a7d69ea5710d6f079b599017f867296c065184a28bf1c0a1e0899c723f1c8b8379d5478a82b9e1a83ca4b263

    • SSDEEP

      24576:qBBkOlRe8ZcXPuCyRdaN1yV/vELneAcCg8:uOOy8eEa1Jct8

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks