General

  • Target

    17988d10c91dc34a69637964b5afdb3800e23ddf13219985235aff4f0d712491N

  • Size

    1.7MB

  • Sample

    241027-f2c35sthle

  • MD5

    3fba7f79ef350176d3df69eadadad6d0

  • SHA1

    287507f1ec455c36c70ba2a8923b9834a3849376

  • SHA256

    17988d10c91dc34a69637964b5afdb3800e23ddf13219985235aff4f0d712491

  • SHA512

    fd2cbf1407ea0931b8b2ab3c47e9586113d395c8ef3e311ada6405f5cf8a20b1c16dfa1c1b4a1d1a266c0e5ab784fafd127cce194546cd99263ddc3fcb48c748

  • SSDEEP

    24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG

Malware Config

Targets

    • Target

      17988d10c91dc34a69637964b5afdb3800e23ddf13219985235aff4f0d712491N

    • Size

      1.7MB

    • MD5

      3fba7f79ef350176d3df69eadadad6d0

    • SHA1

      287507f1ec455c36c70ba2a8923b9834a3849376

    • SHA256

      17988d10c91dc34a69637964b5afdb3800e23ddf13219985235aff4f0d712491

    • SHA512

      fd2cbf1407ea0931b8b2ab3c47e9586113d395c8ef3e311ada6405f5cf8a20b1c16dfa1c1b4a1d1a266c0e5ab784fafd127cce194546cd99263ddc3fcb48c748

    • SSDEEP

      24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks