General

  • Target

    8bc4ca0ef9348f4a331f850af113f2134c0aba41f6a1e9dd26f9b34db34b473b.exe

  • Size

    2.0MB

  • Sample

    241121-epzwpstjcr

  • MD5

    0707542d6d884c5c595b38ebedd025c9

  • SHA1

    686f867f37c8aca23ea3cc298dec856667c1afcd

  • SHA256

    8bc4ca0ef9348f4a331f850af113f2134c0aba41f6a1e9dd26f9b34db34b473b

  • SHA512

    945eeeadb00c19934d034cfb9bd158246e2fcb989bb8808ce3fffee7707cc4ae1f83310db961ecfbd0bc99304b8c041ec7e4ee83893d1db7eac54910970cccc0

  • SSDEEP

    49152:fA6rKdfybQlb8Em0lP/PHNQsGE6+tlcwDXbuvDtkI:XrKngUlPtQsG831burKI

Malware Config

Targets

    • Target

      8bc4ca0ef9348f4a331f850af113f2134c0aba41f6a1e9dd26f9b34db34b473b.exe

    • Size

      2.0MB

    • MD5

      0707542d6d884c5c595b38ebedd025c9

    • SHA1

      686f867f37c8aca23ea3cc298dec856667c1afcd

    • SHA256

      8bc4ca0ef9348f4a331f850af113f2134c0aba41f6a1e9dd26f9b34db34b473b

    • SHA512

      945eeeadb00c19934d034cfb9bd158246e2fcb989bb8808ce3fffee7707cc4ae1f83310db961ecfbd0bc99304b8c041ec7e4ee83893d1db7eac54910970cccc0

    • SSDEEP

      49152:fA6rKdfybQlb8Em0lP/PHNQsGE6+tlcwDXbuvDtkI:XrKngUlPtQsG831burKI

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks