General

  • Target

    717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe

  • Size

    1.7MB

  • Sample

    241124-j1ky5sxman

  • MD5

    9ecc3c152d84531b1ceba5d779e60750

  • SHA1

    2db878eb2f9bfb50cfa51a12544a3cd4ae337d31

  • SHA256

    717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530

  • SHA512

    02864e5aaa7a7cf4a321e19eae5fe5e752299775387c52560c1c5c036e3fa7daf79d019f34b77206980a669d11f515a4c6f52c28fbbcdb6ffd616c3c4418fb1b

  • SSDEEP

    24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG

Malware Config

Targets

    • Target

      717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530N.exe

    • Size

      1.7MB

    • MD5

      9ecc3c152d84531b1ceba5d779e60750

    • SHA1

      2db878eb2f9bfb50cfa51a12544a3cd4ae337d31

    • SHA256

      717b0a35b674ab81c9a8eaaa28ce6a9beb1d925e0f6dfb7ee7a7822298ab6530

    • SHA512

      02864e5aaa7a7cf4a321e19eae5fe5e752299775387c52560c1c5c036e3fa7daf79d019f34b77206980a669d11f515a4c6f52c28fbbcdb6ffd616c3c4418fb1b

    • SSDEEP

      24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks