General

  • Target

    physmeme.exe

  • Size

    2.1MB

  • Sample

    241105-jnyz8szmfq

  • MD5

    e0216529a1eaed9f919e40074ca84f33

  • SHA1

    3c2c9e6fc0e096b8aba3c96b3c23431a8aa17cc8

  • SHA256

    48cead232045bf8ed6d8dbca3e2072be474fd74ad8901e7a3febe44a9315e5c1

  • SHA512

    e03c5823c27b7f6b4b61ecd48a2ab1019da4e10d3de53965a183b03ef5ebdba07532d28e6284b51ceceb7fc4794719220038faccd5cb9d2a767dd82697a969df

  • SSDEEP

    49152:IBJEYs0etiDFHKn8aDCIjT8hXnFd7kykcE:yeYDBQ8JIn8lFd7kykcE

Malware Config

Targets

    • Target

      physmeme.exe

    • Size

      2.1MB

    • MD5

      e0216529a1eaed9f919e40074ca84f33

    • SHA1

      3c2c9e6fc0e096b8aba3c96b3c23431a8aa17cc8

    • SHA256

      48cead232045bf8ed6d8dbca3e2072be474fd74ad8901e7a3febe44a9315e5c1

    • SHA512

      e03c5823c27b7f6b4b61ecd48a2ab1019da4e10d3de53965a183b03ef5ebdba07532d28e6284b51ceceb7fc4794719220038faccd5cb9d2a767dd82697a969df

    • SSDEEP

      49152:IBJEYs0etiDFHKn8aDCIjT8hXnFd7kykcE:yeYDBQ8JIn8lFd7kykcE

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks