General

  • Target

    9bf682da18ee541ddafba4948eb06320N.exe

  • Size

    784KB

  • Sample

    240726-hzvxaatbjm

  • MD5

    9bf682da18ee541ddafba4948eb06320

  • SHA1

    5fc59eb41e89bafd2949ef9d52fb43578b228632

  • SHA256

    fcccb01cef6b3c72fdd7d86e997492ba8125f18249cf19e63ec1b9e85b7c7482

  • SHA512

    19bdc574adc9fe0f7766c3a7054d8aa4c0c9da7abd608352d52f88a6ab9de17c74519a1b2245a36fa185083a76c86e97c28777882c2333dc88b3265228be88ba

  • SSDEEP

    12288:+qnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:++ORToOWSi5gBoS4wYUJ0eo2

Malware Config

Targets

    • Target

      9bf682da18ee541ddafba4948eb06320N.exe

    • Size

      784KB

    • MD5

      9bf682da18ee541ddafba4948eb06320

    • SHA1

      5fc59eb41e89bafd2949ef9d52fb43578b228632

    • SHA256

      fcccb01cef6b3c72fdd7d86e997492ba8125f18249cf19e63ec1b9e85b7c7482

    • SHA512

      19bdc574adc9fe0f7766c3a7054d8aa4c0c9da7abd608352d52f88a6ab9de17c74519a1b2245a36fa185083a76c86e97c28777882c2333dc88b3265228be88ba

    • SSDEEP

      12288:+qnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:++ORToOWSi5gBoS4wYUJ0eo2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks