General

  • Target

    14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N

  • Size

    973KB

  • Sample

    241001-tcxcda1hkc

  • MD5

    9e2d06b56585b3d7cf2453d98c53de20

  • SHA1

    5858c3ae6bdf0e1a2f4d15d02094cf0172946c52

  • SHA256

    14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041

  • SHA512

    c6b32a070a557c3bc23c807a419305f6bf91033a9d4a010c110c1221962718c3d0bb582ac20ff9e0344caa504545ea5aacfc17979003327fda1c192b962d4010

  • SSDEEP

    12288:/hhBMuext92N3cit1RGJV/H0uQ1PjmzBd5EBy10cgZMc29ZxasnLlDD:/5E92NRzO/UFdmBchH29Zsg9

Malware Config

Targets

    • Target

      14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041N

    • Size

      973KB

    • MD5

      9e2d06b56585b3d7cf2453d98c53de20

    • SHA1

      5858c3ae6bdf0e1a2f4d15d02094cf0172946c52

    • SHA256

      14fe2e3c3da4f7833248a28afe183191cb4a0bb4412fd6b7efdd2606542c8041

    • SHA512

      c6b32a070a557c3bc23c807a419305f6bf91033a9d4a010c110c1221962718c3d0bb582ac20ff9e0344caa504545ea5aacfc17979003327fda1c192b962d4010

    • SSDEEP

      12288:/hhBMuext92N3cit1RGJV/H0uQ1PjmzBd5EBy10cgZMc29ZxasnLlDD:/5E92NRzO/UFdmBchH29Zsg9

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks