General

  • Target

    primodal_steam_module.exe

  • Size

    3.1MB

  • Sample

    240617-k16raatenh

  • MD5

    4217d37a5cb59c1d14d636985cfec7ec

  • SHA1

    132bd7f56db7c4849364df15ba8e2e6cc2b16205

  • SHA256

    fff08a4d2f28a06068b3a440cf4c5ee8f30950af3345c80efcb05839be155f26

  • SHA512

    126719d7ae54dcdbc2c47a16dc2797132c6f06c8959bf72254d27be3b3281dd0a61c71ceeb11930419389aee0dc017678045877212b54075299a51efe89b5d44

  • SSDEEP

    98304:VbIQ07ABDx/k0cPAlrxvXeZpTcz4L+UbX5dS53:V50MBDx/r4ADvQOz4npd4

Malware Config

Targets

    • Target

      primodal_steam_module.exe

    • Size

      3.1MB

    • MD5

      4217d37a5cb59c1d14d636985cfec7ec

    • SHA1

      132bd7f56db7c4849364df15ba8e2e6cc2b16205

    • SHA256

      fff08a4d2f28a06068b3a440cf4c5ee8f30950af3345c80efcb05839be155f26

    • SHA512

      126719d7ae54dcdbc2c47a16dc2797132c6f06c8959bf72254d27be3b3281dd0a61c71ceeb11930419389aee0dc017678045877212b54075299a51efe89b5d44

    • SSDEEP

      98304:VbIQ07ABDx/k0cPAlrxvXeZpTcz4L+UbX5dS53:V50MBDx/r4ADvQOz4npd4

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks