General
-
Target
DCRatBuild.exe
-
Size
3.2MB
-
Sample
240728-m8nlsatgqr
-
MD5
cf5d0761745d4ee36e4ec956eca8ba9d
-
SHA1
0eae925855b6e661c7b9bf0f47e4ac998ddba2da
-
SHA256
9b1cc99b69c9936885932acd2010c9572245a7ea290b88730738e15e3fc274bb
-
SHA512
62dfb12641642727abf7b8d19ec1d614805b6135bfd1165ff93e3e0c6bfab3bb13682326f7ce15706306c5dc6b93acd7e86156d0ee9b383e5690130cced347ea
-
SSDEEP
49152:UbA30MrK5MiE9IMqjwJvxyg2joIz69+8BFLlD+xUL2772M3WQf4LzNBNv:UbfKVIDY5123z69fB9lD+GL2eiWQQBNv
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
DCRatBuild.exe
-
Size
3.2MB
-
MD5
cf5d0761745d4ee36e4ec956eca8ba9d
-
SHA1
0eae925855b6e661c7b9bf0f47e4ac998ddba2da
-
SHA256
9b1cc99b69c9936885932acd2010c9572245a7ea290b88730738e15e3fc274bb
-
SHA512
62dfb12641642727abf7b8d19ec1d614805b6135bfd1165ff93e3e0c6bfab3bb13682326f7ce15706306c5dc6b93acd7e86156d0ee9b383e5690130cced347ea
-
SSDEEP
49152:UbA30MrK5MiE9IMqjwJvxyg2joIz69+8BFLlD+xUL2772M3WQf4LzNBNv:UbfKVIDY5123z69fB9lD+GL2eiWQQBNv
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2