General

  • Target

    7b62293bc123569809bdf209855dfdcfb1c155295e1284ebe500a737267547dd.exe

  • Size

    1017KB

  • Sample

    241122-r78yjsspev

  • MD5

    d3c5eed3ff2e208576288da3caf4feb7

  • SHA1

    5405262345f60c37eec11c8731f163069137864f

  • SHA256

    7b62293bc123569809bdf209855dfdcfb1c155295e1284ebe500a737267547dd

  • SHA512

    b67c12670cd42b816d2be8d6524c8b6122e8b239ff2f006c799f94daa4c9f4eafb24f91bd7208db3c94db926afcc7fbfd05f87f03201f567132984923e38e899

  • SSDEEP

    12288:FWS8z4eYDr/0fAhZRFABcwTiEJad8KZyc2nS1hYLcS4nQsMPd7XSeD6vGaI1qn4M:FWSK6H0fMGcwzJsZZyLwvn2V7nDki+4M

Malware Config

Targets

    • Target

      7b62293bc123569809bdf209855dfdcfb1c155295e1284ebe500a737267547dd.exe

    • Size

      1017KB

    • MD5

      d3c5eed3ff2e208576288da3caf4feb7

    • SHA1

      5405262345f60c37eec11c8731f163069137864f

    • SHA256

      7b62293bc123569809bdf209855dfdcfb1c155295e1284ebe500a737267547dd

    • SHA512

      b67c12670cd42b816d2be8d6524c8b6122e8b239ff2f006c799f94daa4c9f4eafb24f91bd7208db3c94db926afcc7fbfd05f87f03201f567132984923e38e899

    • SSDEEP

      12288:FWS8z4eYDr/0fAhZRFABcwTiEJad8KZyc2nS1hYLcS4nQsMPd7XSeD6vGaI1qn4M:FWSK6H0fMGcwzJsZZyLwvn2V7nDki+4M

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks