General

  • Target

    f395305daac1c6e8fd577b85bc9132b5358c9e4c4b818b61f76d50d2477a3906.exe

  • Size

    1.1MB

  • Sample

    241124-deqplswreq

  • MD5

    a92e55e04cc2026f53c97bdf0e91f6ba

  • SHA1

    a31af958d3f885e0f55465acc214bdb0d56e672f

  • SHA256

    f395305daac1c6e8fd577b85bc9132b5358c9e4c4b818b61f76d50d2477a3906

  • SHA512

    441ca291ccc66f16b5252d65c23fb9f0a57f242ca35f196f41175e2c4d3adc436b026111b79fb4c77db9dbe6370e837133c1d02e571730831293e0a1ffeb95a9

  • SSDEEP

    24576:U2G/nvxW3Ww0t43eblFYt2e9esxtDyVjD7D1NauFd3YP+ow7d:UbA3042rejxtDydhcQ

Malware Config

Targets

    • Target

      f395305daac1c6e8fd577b85bc9132b5358c9e4c4b818b61f76d50d2477a3906.exe

    • Size

      1.1MB

    • MD5

      a92e55e04cc2026f53c97bdf0e91f6ba

    • SHA1

      a31af958d3f885e0f55465acc214bdb0d56e672f

    • SHA256

      f395305daac1c6e8fd577b85bc9132b5358c9e4c4b818b61f76d50d2477a3906

    • SHA512

      441ca291ccc66f16b5252d65c23fb9f0a57f242ca35f196f41175e2c4d3adc436b026111b79fb4c77db9dbe6370e837133c1d02e571730831293e0a1ffeb95a9

    • SSDEEP

      24576:U2G/nvxW3Ww0t43eblFYt2e9esxtDyVjD7D1NauFd3YP+ow7d:UbA3042rejxtDydhcQ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks