General

  • Target

    5e24470c0ffbb6df1fd04ff55e861a806efcfe2ba2a486a20643d4e0fe69ac01N.exe

  • Size

    1.1MB

  • Sample

    241111-x94dqsvdja

  • MD5

    2ba1b8f482ac5910dcaa3dd5803c3e01

  • SHA1

    e7928803a85484b7c47e8ab005d900b47ba4f4f0

  • SHA256

    46116c9ab1a99b38621209da4c405a638542e11e818f8b93929bba881e619199

  • SHA512

    55dccab037e6ad7a6dcab0cb3fd5f00952c573ae2250cb9ec3d0e5034256e2de69f60b5e383a303fbc72c12de912ad0782ccbc90500fb778ea9a5cbb873192b7

  • SSDEEP

    24576:ZxU376C0skFgqIyXFnbCDQgZ8e7FRsWC9ZRHInh4j1Cf6liXwkOmpdE:EPkVXFGDQoP7FRCZRonh4hfewhmpdE

Malware Config

Targets

    • Target

      5e24470c0ffbb6df1fd04ff55e861a806efcfe2ba2a486a20643d4e0fe69ac01N.exe

    • Size

      1.1MB

    • MD5

      2ba1b8f482ac5910dcaa3dd5803c3e01

    • SHA1

      e7928803a85484b7c47e8ab005d900b47ba4f4f0

    • SHA256

      46116c9ab1a99b38621209da4c405a638542e11e818f8b93929bba881e619199

    • SHA512

      55dccab037e6ad7a6dcab0cb3fd5f00952c573ae2250cb9ec3d0e5034256e2de69f60b5e383a303fbc72c12de912ad0782ccbc90500fb778ea9a5cbb873192b7

    • SSDEEP

      24576:ZxU376C0skFgqIyXFnbCDQgZ8e7FRsWC9ZRHInh4j1Cf6liXwkOmpdE:EPkVXFGDQoP7FRCZRonh4hfewhmpdE

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks