General
-
Target
DCRatBuild.exe
-
Size
3.1MB
-
Sample
241103-ajxryaypas
-
MD5
8f648fc108316e4b8ff2ce7cfb010834
-
SHA1
1f5ce63997b036dd7b192eedb67fa92d16737484
-
SHA256
47efd687dcfd8b5db64bfa28f8d5479bca12c000d2a50d054698055bb4497028
-
SHA512
a404333c593e9ab0d5b5d969e6a94a6b6cfae9c87e8a6bf971891def42336986df3fcd4f6b489b00f0f75e3a309b496554d5c895b5916ae44580f5b829a4f247
-
SSDEEP
49152:ubA3jsc787INQ481IA7o/wJZts4rhwxz+UCShrMAbYV5jSa:ubdcg7IrU/ZtZrmz+fArzb+5jSa
Malware Config
Targets
-
-
Target
DCRatBuild.exe
-
Size
3.1MB
-
MD5
8f648fc108316e4b8ff2ce7cfb010834
-
SHA1
1f5ce63997b036dd7b192eedb67fa92d16737484
-
SHA256
47efd687dcfd8b5db64bfa28f8d5479bca12c000d2a50d054698055bb4497028
-
SHA512
a404333c593e9ab0d5b5d969e6a94a6b6cfae9c87e8a6bf971891def42336986df3fcd4f6b489b00f0f75e3a309b496554d5c895b5916ae44580f5b829a4f247
-
SSDEEP
49152:ubA3jsc787INQ481IA7o/wJZts4rhwxz+UCShrMAbYV5jSa:ubdcg7IrU/ZtZrmz+fArzb+5jSa
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1