General

  • Target

    87a4b8833cd4cb394e3b19b1672491575466fe8b0afb935b7d9363a1cbaca59d.exe

  • Size

    1.1MB

  • Sample

    241118-czacpawcmb

  • MD5

    5216ca61384f1d0eaa9b873e0b756f0b

  • SHA1

    c29692709f869ebc5743f561c8f3975b2a2d5ae9

  • SHA256

    87a4b8833cd4cb394e3b19b1672491575466fe8b0afb935b7d9363a1cbaca59d

  • SHA512

    8dce4092b5a9c10309228a55f0a9a6d3508eae2f1f8bf26e2196f4426398d35d2618cc001d5665be5b24cfb138c46153c74b3b56e37d26e8ec7b8c0ebbd11758

  • SSDEEP

    24576:U2G/nvxW3Ww0t7EJyn5ySinOYEI09IlOmLdRz4:UbA307EJ3tEI06Rs

Malware Config

Targets

    • Target

      87a4b8833cd4cb394e3b19b1672491575466fe8b0afb935b7d9363a1cbaca59d.exe

    • Size

      1.1MB

    • MD5

      5216ca61384f1d0eaa9b873e0b756f0b

    • SHA1

      c29692709f869ebc5743f561c8f3975b2a2d5ae9

    • SHA256

      87a4b8833cd4cb394e3b19b1672491575466fe8b0afb935b7d9363a1cbaca59d

    • SHA512

      8dce4092b5a9c10309228a55f0a9a6d3508eae2f1f8bf26e2196f4426398d35d2618cc001d5665be5b24cfb138c46153c74b3b56e37d26e8ec7b8c0ebbd11758

    • SSDEEP

      24576:U2G/nvxW3Ww0t7EJyn5ySinOYEI09IlOmLdRz4:UbA307EJ3tEI06Rs

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks