General

  • Target

    1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe

  • Size

    2.1MB

  • Sample

    241124-hgrrxaykf1

  • MD5

    96affeab8e13743e57269977f1805472

  • SHA1

    8935028d2abde57185acd3e1f59d831cc6ac5bc0

  • SHA256

    1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459

  • SHA512

    a8a1c5c302f6d51a7d390bf47ee0b4e2513498fec1081ffd2ec819133149c59c6b6bac7f6c8e7d7bd0e557c4f77f2789324cae8ccda90e1d60b3906b5d448fea

  • SSDEEP

    49152:Cx55PUIP9xbGEfCErDBBDNvlbslAIETt1TIo3sa:klP9hAqXN6EHTj3sa

Malware Config

Targets

    • Target

      1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459.exe

    • Size

      2.1MB

    • MD5

      96affeab8e13743e57269977f1805472

    • SHA1

      8935028d2abde57185acd3e1f59d831cc6ac5bc0

    • SHA256

      1a23b06a1a5708eb5557d8ba9c15d4c4608875a9d128d358a75f2c4344081459

    • SHA512

      a8a1c5c302f6d51a7d390bf47ee0b4e2513498fec1081ffd2ec819133149c59c6b6bac7f6c8e7d7bd0e557c4f77f2789324cae8ccda90e1d60b3906b5d448fea

    • SSDEEP

      49152:Cx55PUIP9xbGEfCErDBBDNvlbslAIETt1TIo3sa:klP9hAqXN6EHTj3sa

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks