General

  • Target

    5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9N

  • Size

    1.3MB

  • Sample

    241105-gaj8tawamc

  • MD5

    577b7949ddeffc75751b24086b24bdc0

  • SHA1

    fcf6f523c69daaf3625b110e7f1f3038e99b4b7e

  • SHA256

    5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9

  • SHA512

    91054af8e4f831b13bf778852f3364f4982e9a7c08632ef5972d57b6916ca7a4341799349ccf91a73f75d0ad2641356e9ddc6802505ff9f09720952f4a018d75

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9N

    • Size

      1.3MB

    • MD5

      577b7949ddeffc75751b24086b24bdc0

    • SHA1

      fcf6f523c69daaf3625b110e7f1f3038e99b4b7e

    • SHA256

      5cf6fb2fd47e964237692b36bdb37b5e5d8eea7006d1578568c8282320bb77a9

    • SHA512

      91054af8e4f831b13bf778852f3364f4982e9a7c08632ef5972d57b6916ca7a4341799349ccf91a73f75d0ad2641356e9ddc6802505ff9f09720952f4a018d75

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks