General

  • Target

    6d88a5462b28fd339bc3d85d60c1a340N.exe

  • Size

    1.5MB

  • Sample

    240725-eqn6la1bmg

  • MD5

    6d88a5462b28fd339bc3d85d60c1a340

  • SHA1

    58116f47109092bd855cefa90820ee8e5fdd1346

  • SHA256

    1f9e61c82cd02f8cb6780816776425413962b725ad18078c3e905af5484db607

  • SHA512

    a69a83ab46f7842ae71335d98dbdaab7c94fbdaf977d7113370bcfebb59dae30fb1a1238a72587f4931cc1987b09fca493b51c11a6488068d46e8c75ce184353

  • SSDEEP

    24576:EU5vvCDsOPh09mqwTbgh6OATBjqh2y58fRbkTHn8zH3fFPciPHv+TiE9+4:1CemoYOqoylkTcj9EiPH9F

Malware Config

Targets

    • Target

      6d88a5462b28fd339bc3d85d60c1a340N.exe

    • Size

      1.5MB

    • MD5

      6d88a5462b28fd339bc3d85d60c1a340

    • SHA1

      58116f47109092bd855cefa90820ee8e5fdd1346

    • SHA256

      1f9e61c82cd02f8cb6780816776425413962b725ad18078c3e905af5484db607

    • SHA512

      a69a83ab46f7842ae71335d98dbdaab7c94fbdaf977d7113370bcfebb59dae30fb1a1238a72587f4931cc1987b09fca493b51c11a6488068d46e8c75ce184353

    • SSDEEP

      24576:EU5vvCDsOPh09mqwTbgh6OATBjqh2y58fRbkTHn8zH3fFPciPHv+TiE9+4:1CemoYOqoylkTcj9EiPH9F

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks