General
-
Target
DCRat.exe
-
Size
15.0MB
-
Sample
240622-tclwmstamf
-
MD5
d4adfcf9065296e31a49327ebe642584
-
SHA1
83f527cdb0868e772c0538fe64c68e71e8e38669
-
SHA256
d958d55003daa3b5e322a920126104fbd93663b46803c8653aa0240aa1e80244
-
SHA512
10942a219ec55be6c7324f1962fccff1281d0870b906bab03622d6803426db26fd3702ce350e4b05dae761031df155ff1248eb44a9fe627522f03a848f6c0929
-
SSDEEP
393216:NdiQoFnY61ZmZZBFGndTMXdPpLNGxrkLzgTTP5b:NdiQoFnY61ZmXBFGdfrUIx
Behavioral task
behavioral1
Sample
DCRat.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
DCRat.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1248497570939011083/iys0Q-I2H74ZeU8iK8mxnadLGnKvFVeC_daDGNMshULRzjYbAnJMv_etelbvONsTKIUG
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
update.exe
-
pastebin_url
https://pastebin.com/raw/CNZj0axn
-
telegram
https://api.telegram.org/bot7009114103:AAGQ9PxSyhh1FE2I9esEeyfU9zAsNkooOqo/sendMessage?chat_id=1180155027
Targets
-
-
Target
DCRat.exe
-
Size
15.0MB
-
MD5
d4adfcf9065296e31a49327ebe642584
-
SHA1
83f527cdb0868e772c0538fe64c68e71e8e38669
-
SHA256
d958d55003daa3b5e322a920126104fbd93663b46803c8653aa0240aa1e80244
-
SHA512
10942a219ec55be6c7324f1962fccff1281d0870b906bab03622d6803426db26fd3702ce350e4b05dae761031df155ff1248eb44a9fe627522f03a848f6c0929
-
SSDEEP
393216:NdiQoFnY61ZmZZBFGndTMXdPpLNGxrkLzgTTP5b:NdiQoFnY61ZmXBFGdfrUIx
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Umbral payload
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1