General

  • Target

    26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe

  • Size

    2.9MB

  • Sample

    241124-eg3ydssqbw

  • MD5

    19aefa5703872789a85c9c8e7c123aca

  • SHA1

    5207463f1ec2987e68c97399571c4ef52763bacc

  • SHA256

    26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e

  • SHA512

    5117be7adb0b42505ce453a3f6e3cb73ed5b71c186ff660d7cceb92b11ab89bbf897f48a3a05d19e63fe69361bc58276c99b1d93eb3173c01f379a11b0850c70

  • SSDEEP

    49152:7wefjxPCEjdphA8ZLUj+khAHYevjm7rDeqYQjmCYi78jFg:7zqCA85UuHYeLu0PCYi78a

Malware Config

Targets

    • Target

      26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e.exe

    • Size

      2.9MB

    • MD5

      19aefa5703872789a85c9c8e7c123aca

    • SHA1

      5207463f1ec2987e68c97399571c4ef52763bacc

    • SHA256

      26c26f312d1586930f15ed4d2be8a9a6728e79d37b571088443fd142d121a63e

    • SHA512

      5117be7adb0b42505ce453a3f6e3cb73ed5b71c186ff660d7cceb92b11ab89bbf897f48a3a05d19e63fe69361bc58276c99b1d93eb3173c01f379a11b0850c70

    • SSDEEP

      49152:7wefjxPCEjdphA8ZLUj+khAHYevjm7rDeqYQjmCYi78jFg:7zqCA85UuHYeLu0PCYi78a

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks