General

  • Target

    7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930.exe

  • Size

    4.1MB

  • Sample

    241121-a8fjysxgqp

  • MD5

    fc12e64914d68aa8fcacfe14eac14973

  • SHA1

    ffb90d0353325044a8e77a1b3d32c157e522ec6e

  • SHA256

    7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930

  • SHA512

    6d2ff1530504b6a3fccb9bc2fce1e0844b5d901407af185b7b9b827896cfce26ea97f230d1f68ee577cf1665a4d0d2fe5b34532634dcc2bd05d5ff2ce77fbae0

  • SSDEEP

    98304:cBLZABTF8Ic94u3YveXYBLZABTF8Ic94u3YveXB:cBZAB+33Y2oBZAB+33Y2x

Malware Config

Targets

    • Target

      7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930.exe

    • Size

      4.1MB

    • MD5

      fc12e64914d68aa8fcacfe14eac14973

    • SHA1

      ffb90d0353325044a8e77a1b3d32c157e522ec6e

    • SHA256

      7a51c74f9e3082a8fdc5b2aa00d105ac565ed3a696b7b59ec562f0a15cf77930

    • SHA512

      6d2ff1530504b6a3fccb9bc2fce1e0844b5d901407af185b7b9b827896cfce26ea97f230d1f68ee577cf1665a4d0d2fe5b34532634dcc2bd05d5ff2ce77fbae0

    • SSDEEP

      98304:cBLZABTF8Ic94u3YveXYBLZABTF8Ic94u3YveXB:cBZAB+33Y2oBZAB+33Y2x

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks