General

  • Target

    762c9041718b74ea4d1c867ce25458cc186da07d1f8d413af8849d63275a5265N

  • Size

    1.7MB

  • Sample

    241002-m2jn9ascqr

  • MD5

    60e9f67282a82c9c17f3a631a2c66300

  • SHA1

    9d7d09fae36c3ed30e7114fc16b9c168899258d4

  • SHA256

    762c9041718b74ea4d1c867ce25458cc186da07d1f8d413af8849d63275a5265

  • SHA512

    21bf504539949e72a2ec78ba15d985ded1f005b2c34d7b671c97681b69f426706cf6a94340764a3750442ee1b0eb49263afeec2cfb28d3cf17043780a74e3308

  • SSDEEP

    49152:+/MFK5hftE2CQdLYlGU/qPWbQCVLsMhdzRNlbG:UMFA1dElGfWbQCVLsMx

Malware Config

Targets

    • Target

      762c9041718b74ea4d1c867ce25458cc186da07d1f8d413af8849d63275a5265N

    • Size

      1.7MB

    • MD5

      60e9f67282a82c9c17f3a631a2c66300

    • SHA1

      9d7d09fae36c3ed30e7114fc16b9c168899258d4

    • SHA256

      762c9041718b74ea4d1c867ce25458cc186da07d1f8d413af8849d63275a5265

    • SHA512

      21bf504539949e72a2ec78ba15d985ded1f005b2c34d7b671c97681b69f426706cf6a94340764a3750442ee1b0eb49263afeec2cfb28d3cf17043780a74e3308

    • SSDEEP

      49152:+/MFK5hftE2CQdLYlGU/qPWbQCVLsMhdzRNlbG:UMFA1dElGfWbQCVLsMx

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks