General

  • Target

    13129962f25c4ef3f982cd46a2577375588c49c4d39067c9aecb9f3602c42055N

  • Size

    1.3MB

  • Sample

    241106-vfv46awndr

  • MD5

    56c01f1253725415dcc2543936c03130

  • SHA1

    35cb7dc4bba04c0dca729dcf03539ce42db43de6

  • SHA256

    13129962f25c4ef3f982cd46a2577375588c49c4d39067c9aecb9f3602c42055

  • SHA512

    94a47e5aa9c8cde6b449e298f3af484466b819acfcc91ef8aa5a6b7897d950f6fa1c5e800743370c9bfb64eaeb84cf9a3770d072c2b4da343bc791a184bfb927

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      13129962f25c4ef3f982cd46a2577375588c49c4d39067c9aecb9f3602c42055N

    • Size

      1.3MB

    • MD5

      56c01f1253725415dcc2543936c03130

    • SHA1

      35cb7dc4bba04c0dca729dcf03539ce42db43de6

    • SHA256

      13129962f25c4ef3f982cd46a2577375588c49c4d39067c9aecb9f3602c42055

    • SHA512

      94a47e5aa9c8cde6b449e298f3af484466b819acfcc91ef8aa5a6b7897d950f6fa1c5e800743370c9bfb64eaeb84cf9a3770d072c2b4da343bc791a184bfb927

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks