General

  • Target

    NEAS.6d8873c8ba23b5fca6972375bf9209c0.exe

  • Size

    1.1MB

  • Sample

    231107-d4blzsag9y

  • MD5

    6d8873c8ba23b5fca6972375bf9209c0

  • SHA1

    9fb4e593cee2cb3aa051f6dfcea2495318c71ee6

  • SHA256

    202edcaf68d27322eff4469dcbc0a48888fe449d28e6a0aad97b4be8b62fd9d2

  • SHA512

    c31cfbd587ed69cec0f5046f94b3ad4e75a4ad767f9d6caf77a81507a500aeb6094788e9b49ef3e082c90aebdb207451b19d2e629222ac0f4f12445c0bc195b1

  • SSDEEP

    12288:0l+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btU:pyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f

Malware Config

Targets

    • Target

      NEAS.6d8873c8ba23b5fca6972375bf9209c0.exe

    • Size

      1.1MB

    • MD5

      6d8873c8ba23b5fca6972375bf9209c0

    • SHA1

      9fb4e593cee2cb3aa051f6dfcea2495318c71ee6

    • SHA256

      202edcaf68d27322eff4469dcbc0a48888fe449d28e6a0aad97b4be8b62fd9d2

    • SHA512

      c31cfbd587ed69cec0f5046f94b3ad4e75a4ad767f9d6caf77a81507a500aeb6094788e9b49ef3e082c90aebdb207451b19d2e629222ac0f4f12445c0bc195b1

    • SSDEEP

      12288:0l+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btU:pyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks