General

  • Target

    0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175

  • Size

    4.0MB

  • Sample

    240531-w9ff8shh23

  • MD5

    aac697ab0d583fcc8641ce4365b1fea2

  • SHA1

    57ada9976d56f577b18f005dcc369258d70259fc

  • SHA256

    0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175

  • SHA512

    cbe76916ecdf7d3afabde6459e4d3355db529a22f2fd834ade8e50b61eb62a8ef9f3ff46a7091108bc2f54b40d035f3a26605d1ed65b0e945b2fe7fe07c86071

  • SSDEEP

    49152:XYIdUmmujCJIMTmrXMdgjexOXKIDNKKCEBiYvWmiAafeQT/v4QlSVfwRA/ld2MnV:IIav/IMTmzMdgN/xvW1A/QTY1KAwMZP

Malware Config

Targets

    • Target

      0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175

    • Size

      4.0MB

    • MD5

      aac697ab0d583fcc8641ce4365b1fea2

    • SHA1

      57ada9976d56f577b18f005dcc369258d70259fc

    • SHA256

      0cc4a5350887ecd6d55eed9b617d34c43f6579218545d522318f3e6d64460175

    • SHA512

      cbe76916ecdf7d3afabde6459e4d3355db529a22f2fd834ade8e50b61eb62a8ef9f3ff46a7091108bc2f54b40d035f3a26605d1ed65b0e945b2fe7fe07c86071

    • SSDEEP

      49152:XYIdUmmujCJIMTmrXMdgjexOXKIDNKKCEBiYvWmiAafeQT/v4QlSVfwRA/ld2MnV:IIav/IMTmzMdgN/xvW1A/QTY1KAwMZP

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Detects executables packed with SmartAssembly

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks