General

  • Target

    51fbd187cfdcfa5f9bb3271223141daca26d39fb1cf9d4af5cf56886d25c951cN.exe

  • Size

    1.1MB

  • Sample

    241115-v9md4syemk

  • MD5

    dfdfa4cfa0555110be5c0f69329ce340

  • SHA1

    320fbd77e0f233c065065b15bba8577e6f4c5aa9

  • SHA256

    51fbd187cfdcfa5f9bb3271223141daca26d39fb1cf9d4af5cf56886d25c951c

  • SHA512

    720c683f47847b9fd9f7db3eabbd2a982dab8c5d0c9e0280695d30336b9e125f66a09123d531e1a87b537098da169400c8c1c18cc5b670f2285a133e1b3d0453

  • SSDEEP

    24576:ZxU376C0skFgqIyXFnbCDQgZ8e7FRsWC9ZRHInh4j1Cf6liXwkOmpd:EPkVXFGDQoP7FRCZRonh4hfewhmpd

Malware Config

Targets

    • Target

      51fbd187cfdcfa5f9bb3271223141daca26d39fb1cf9d4af5cf56886d25c951cN.exe

    • Size

      1.1MB

    • MD5

      dfdfa4cfa0555110be5c0f69329ce340

    • SHA1

      320fbd77e0f233c065065b15bba8577e6f4c5aa9

    • SHA256

      51fbd187cfdcfa5f9bb3271223141daca26d39fb1cf9d4af5cf56886d25c951c

    • SHA512

      720c683f47847b9fd9f7db3eabbd2a982dab8c5d0c9e0280695d30336b9e125f66a09123d531e1a87b537098da169400c8c1c18cc5b670f2285a133e1b3d0453

    • SSDEEP

      24576:ZxU376C0skFgqIyXFnbCDQgZ8e7FRsWC9ZRHInh4j1Cf6liXwkOmpd:EPkVXFGDQoP7FRCZRonh4hfewhmpd

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks