General

  • Target

    ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N

  • Size

    1.6MB

  • Sample

    241026-s8hy7awarh

  • MD5

    8ce0a9103ab10fed54094a3a2d1146e0

  • SHA1

    4aef0ddaa8d065170c0ff2cc099c31aa6b1085aa

  • SHA256

    ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0

  • SHA512

    cf0adcb740f1eec83e6477bc487cf3a0d152222e08f186b78a674e0e9178b591e7088c5a2d2763dbd6eed55e3eef2bbdfaddf1791158e7dad7c891577f71e76f

  • SSDEEP

    24576:NsoVH984fBm2iMbyrpEGwFQ0Gm3eQk31V6hK5r898Qs:NAtJeGwkm3eQk31rF8V

Malware Config

Targets

    • Target

      ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0N

    • Size

      1.6MB

    • MD5

      8ce0a9103ab10fed54094a3a2d1146e0

    • SHA1

      4aef0ddaa8d065170c0ff2cc099c31aa6b1085aa

    • SHA256

      ab7307731f5026b64631fe11b117e29ed3a4c851df388238048b6370bb99fee0

    • SHA512

      cf0adcb740f1eec83e6477bc487cf3a0d152222e08f186b78a674e0e9178b591e7088c5a2d2763dbd6eed55e3eef2bbdfaddf1791158e7dad7c891577f71e76f

    • SSDEEP

      24576:NsoVH984fBm2iMbyrpEGwFQ0Gm3eQk31V6hK5r898Qs:NAtJeGwkm3eQk31rF8V

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks