General

  • Target

    88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489N

  • Size

    1.4MB

  • Sample

    241106-w7vs5svjhs

  • MD5

    778a4d77c6ff79fd7a705c719951dfa0

  • SHA1

    55a597e7fc6d496889618bba175e7f2c61cced4b

  • SHA256

    88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489

  • SHA512

    d6bf52c9115b934df88daf167311e7916d6d8e3d1b44e57a3dc41c8cab755eb8bb2c50a1d4c52791e07630a447aa46987f1503b70a485095ce67893cfe4900bb

  • SSDEEP

    24576:6Ipz2s/RGlw9qwD9TQkzTOfC0Bg/qa9Yyym2Iicp/4xc:6Qzulw0bg/qAymlV

Malware Config

Targets

    • Target

      88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489N

    • Size

      1.4MB

    • MD5

      778a4d77c6ff79fd7a705c719951dfa0

    • SHA1

      55a597e7fc6d496889618bba175e7f2c61cced4b

    • SHA256

      88779158ac60b121c524491e5959f42fd7a98861540d6a4ffc375b17ab23b489

    • SHA512

      d6bf52c9115b934df88daf167311e7916d6d8e3d1b44e57a3dc41c8cab755eb8bb2c50a1d4c52791e07630a447aa46987f1503b70a485095ce67893cfe4900bb

    • SSDEEP

      24576:6Ipz2s/RGlw9qwD9TQkzTOfC0Bg/qa9Yyym2Iicp/4xc:6Qzulw0bg/qAymlV

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks