General

  • Target

    6932a63853e3107a6fc6aba076776ff370d6d79dc076e457eafcc5c6a2b2d9fdN

  • Size

    784KB

  • Sample

    241103-kxetdszhrp

  • MD5

    de823afda19d28d9868a69153f623070

  • SHA1

    9dc57b5bfd50f833432646b5a482e31801297b44

  • SHA256

    6932a63853e3107a6fc6aba076776ff370d6d79dc076e457eafcc5c6a2b2d9fd

  • SHA512

    10b5ced20ffb9082e211245eaf4a002dfab0faf5106f449719529f345be1f2b25a538cd61636d09d6b6326be575cc45c78a8a7c33a3c864f2c376e0996cf71c4

  • SSDEEP

    12288:eqnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:e+ORToOWSi5gBoS4wYUJ0eo2

Malware Config

Targets

    • Target

      6932a63853e3107a6fc6aba076776ff370d6d79dc076e457eafcc5c6a2b2d9fdN

    • Size

      784KB

    • MD5

      de823afda19d28d9868a69153f623070

    • SHA1

      9dc57b5bfd50f833432646b5a482e31801297b44

    • SHA256

      6932a63853e3107a6fc6aba076776ff370d6d79dc076e457eafcc5c6a2b2d9fd

    • SHA512

      10b5ced20ffb9082e211245eaf4a002dfab0faf5106f449719529f345be1f2b25a538cd61636d09d6b6326be575cc45c78a8a7c33a3c864f2c376e0996cf71c4

    • SSDEEP

      12288:eqnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:e+ORToOWSi5gBoS4wYUJ0eo2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks