General

  • Target

    open.exe

  • Size

    1.1MB

  • Sample

    240829-wvwvnsvapd

  • MD5

    63e3bbe17ba7ef19e662edd6ad9a47c8

  • SHA1

    7325ea8532967f2eaa651606c3b186eec06c17e1

  • SHA256

    b03962275185a9247f35cf2e0dd9b7b6c41722855e9722b5e5f464d466774055

  • SHA512

    73a6af3c2aa2de0cfb66c3faffa8c2c829de725fe94374267c4d0233e66f4f2ae1be9f68d0cedb1ee1b8a885f4b9beab910053f8da72551bf22db0aadb7c4700

  • SSDEEP

    24576:V2G/nvxW3WxbhhqVSwxmvcj/GnstMnyGgt2YgUR:VbA3chh+wo0y

Malware Config

Targets

    • Target

      open.exe

    • Size

      1.1MB

    • MD5

      63e3bbe17ba7ef19e662edd6ad9a47c8

    • SHA1

      7325ea8532967f2eaa651606c3b186eec06c17e1

    • SHA256

      b03962275185a9247f35cf2e0dd9b7b6c41722855e9722b5e5f464d466774055

    • SHA512

      73a6af3c2aa2de0cfb66c3faffa8c2c829de725fe94374267c4d0233e66f4f2ae1be9f68d0cedb1ee1b8a885f4b9beab910053f8da72551bf22db0aadb7c4700

    • SSDEEP

      24576:V2G/nvxW3WxbhhqVSwxmvcj/GnstMnyGgt2YgUR:VbA3chh+wo0y

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks