General

  • Target

    Roblox.exe

  • Size

    1.1MB

  • Sample

    241121-smd34sxnep

  • MD5

    c99de49cafe024cda7d3e0a38aff5c55

  • SHA1

    9aabf85ffeb296e8837801b86bd0db5d7bc09584

  • SHA256

    ddbfbdf18dedc2329792c6fe87a8ac12486b54356ac3557d85b6b8282f8b2ca2

  • SHA512

    9f7297343de31d9a5361b4273f28065f2e72c39650e09fe98295655a9d1d18c5f99898e988ce3c96c463d3708398e226b400d0495592f43c0b4232eddb76d12c

  • SSDEEP

    24576:U2G/nvxW3Ww0tnZoqM4yV6IcCnVjMAarg8bc6C:UbA30nZ9M4ecgxB

Malware Config

Targets

    • Target

      Roblox.exe

    • Size

      1.1MB

    • MD5

      c99de49cafe024cda7d3e0a38aff5c55

    • SHA1

      9aabf85ffeb296e8837801b86bd0db5d7bc09584

    • SHA256

      ddbfbdf18dedc2329792c6fe87a8ac12486b54356ac3557d85b6b8282f8b2ca2

    • SHA512

      9f7297343de31d9a5361b4273f28065f2e72c39650e09fe98295655a9d1d18c5f99898e988ce3c96c463d3708398e226b400d0495592f43c0b4232eddb76d12c

    • SSDEEP

      24576:U2G/nvxW3Ww0tnZoqM4yV6IcCnVjMAarg8bc6C:UbA30nZ9M4ecgxB

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks