General

  • Target

    f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f

  • Size

    783KB

  • Sample

    240919-d4318sygqq

  • MD5

    8946d7f1d5ac2d71c78fa58bea789831

  • SHA1

    e481e69b29f81d40c1e89b17324745db00846960

  • SHA256

    f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f

  • SHA512

    b77af5c6d74c36cd227e653b2e9b3d599f12decea74f0a62c435e28724136a413358ae226dd562b9a24f14208908444041da94d86d7ba32d1e87ab6bf012461b

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Targets

    • Target

      f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f

    • Size

      783KB

    • MD5

      8946d7f1d5ac2d71c78fa58bea789831

    • SHA1

      e481e69b29f81d40c1e89b17324745db00846960

    • SHA256

      f85216456a620efc2e49a5a5b1ba7a44ad57ae4fc5da07ce19a4b6e861696c0f

    • SHA512

      b77af5c6d74c36cd227e653b2e9b3d599f12decea74f0a62c435e28724136a413358ae226dd562b9a24f14208908444041da94d86d7ba32d1e87ab6bf012461b

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks