General

  • Target

    buildchecker1.exe

  • Size

    1.1MB

  • Sample

    240725-xxnshssdpf

  • MD5

    ee4839dcc8cf148ce959f4d238f5d696

  • SHA1

    ea27026af975bf81febf24f872b722c19544c0be

  • SHA256

    e0663c567d2eb0a820e22f4f2cf2a728c911e14dbb5aa054e6d24904b4e3ca4e

  • SHA512

    65cbba7b3c2f89a95a38e9e21386084d6fb57162ed34010feae03cb00051537663cfc78475810b123427db6e063a53a9b08170f5aed869d34fd4295c84021093

  • SSDEEP

    12288:aRZ+IoG/n9IQxW3OBsee2X+t4Rbi0tJzEkissVIoXor9ayjhvegiVW9mSYG1sP+c:U2G/nvxW3Ww0tFwkismobjwSYGqAa

Malware Config

Targets

    • Target

      buildchecker1.exe

    • Size

      1.1MB

    • MD5

      ee4839dcc8cf148ce959f4d238f5d696

    • SHA1

      ea27026af975bf81febf24f872b722c19544c0be

    • SHA256

      e0663c567d2eb0a820e22f4f2cf2a728c911e14dbb5aa054e6d24904b4e3ca4e

    • SHA512

      65cbba7b3c2f89a95a38e9e21386084d6fb57162ed34010feae03cb00051537663cfc78475810b123427db6e063a53a9b08170f5aed869d34fd4295c84021093

    • SSDEEP

      12288:aRZ+IoG/n9IQxW3OBsee2X+t4Rbi0tJzEkissVIoXor9ayjhvegiVW9mSYG1sP+c:U2G/nvxW3Ww0tFwkismobjwSYGqAa

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks