General

  • Target

    44e15f3bc7ee9a38a3ce73d8f1a787124ccfd30f644a305d096fee27388447b5.exe

  • Size

    1.1MB

  • Sample

    241115-1lstwaskay

  • MD5

    25e219d16e556ca28df1ae887c017818

  • SHA1

    751f30629bc2320d4d33e1dc0b2f6cb522bdff8b

  • SHA256

    44e15f3bc7ee9a38a3ce73d8f1a787124ccfd30f644a305d096fee27388447b5

  • SHA512

    281fd1a68e828ad98365d6a6a47293d51330deb6a9fb0b9d32045e6f5174cecdb1072846134e333a2b7b544b3d8c54202608a989292a40e1bc4925df88f83fd8

  • SSDEEP

    24576:ZxU376C0skFgqIyXFnbCDQgZ8e7FRsWC9ZRHInh4j1Cf6liXwkOmpdv:EPkVXFGDQoP7FRCZRonh4hfewhmpdv

Malware Config

Targets

    • Target

      44e15f3bc7ee9a38a3ce73d8f1a787124ccfd30f644a305d096fee27388447b5.exe

    • Size

      1.1MB

    • MD5

      25e219d16e556ca28df1ae887c017818

    • SHA1

      751f30629bc2320d4d33e1dc0b2f6cb522bdff8b

    • SHA256

      44e15f3bc7ee9a38a3ce73d8f1a787124ccfd30f644a305d096fee27388447b5

    • SHA512

      281fd1a68e828ad98365d6a6a47293d51330deb6a9fb0b9d32045e6f5174cecdb1072846134e333a2b7b544b3d8c54202608a989292a40e1bc4925df88f83fd8

    • SSDEEP

      24576:ZxU376C0skFgqIyXFnbCDQgZ8e7FRsWC9ZRHInh4j1Cf6liXwkOmpdv:EPkVXFGDQoP7FRCZRonh4hfewhmpdv

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks