General

  • Target

    32ff24d4c2e249b54ba2fdc57de9730926ddfada119eff7913a34ed28ec2e352

  • Size

    1.1MB

  • Sample

    241104-z266rsznbr

  • MD5

    e2f8c16b8406f3f916e9fc18b13cd2bb

  • SHA1

    6bd143013fbc10e7e7bef67c41d8927e0145f56e

  • SHA256

    32ff24d4c2e249b54ba2fdc57de9730926ddfada119eff7913a34ed28ec2e352

  • SHA512

    994e9a8e41b883d14e8f3527885fe3ca98004d6c04caf389541f8c465ba006440dcbc61092be990f73914b8589e97ba959cc647784a217560a65bbd297bd9d56

  • SSDEEP

    24576:U2G/nvxW3Ww0tEPZdPORuj+l34p9CLGqKLS7Y3m7S:UbA30EPvPO9PK3m2

Malware Config

Targets

    • Target

      32ff24d4c2e249b54ba2fdc57de9730926ddfada119eff7913a34ed28ec2e352

    • Size

      1.1MB

    • MD5

      e2f8c16b8406f3f916e9fc18b13cd2bb

    • SHA1

      6bd143013fbc10e7e7bef67c41d8927e0145f56e

    • SHA256

      32ff24d4c2e249b54ba2fdc57de9730926ddfada119eff7913a34ed28ec2e352

    • SHA512

      994e9a8e41b883d14e8f3527885fe3ca98004d6c04caf389541f8c465ba006440dcbc61092be990f73914b8589e97ba959cc647784a217560a65bbd297bd9d56

    • SSDEEP

      24576:U2G/nvxW3Ww0tEPZdPORuj+l34p9CLGqKLS7Y3m7S:UbA30EPvPO9PK3m2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks