General

  • Target

    6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe

  • Size

    2.6MB

  • Sample

    241125-3hz5wsypbp

  • MD5

    0163b78fa3d6908eb367abed8f3e9e94

  • SHA1

    240609d82a62a8017ad3d81ac4271cd7606b5573

  • SHA256

    6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773

  • SHA512

    f0258f74d10b9d1f3cfab6c36afe7e411b9c3cea7641529b5fc3e62706787c9685b6dfccf3fdde708102b43f517a734572da77407f9f4f1d94754fdec1554748

  • SSDEEP

    49152:Z35SQwOGHHy3Gv6KelFCGDZPU542T5eYfn4jmnHwDKni5JsJ:ZpSQEHIKqFCGDZs54+5eYfnCMQ+i5Ja

Malware Config

Targets

    • Target

      6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773.exe

    • Size

      2.6MB

    • MD5

      0163b78fa3d6908eb367abed8f3e9e94

    • SHA1

      240609d82a62a8017ad3d81ac4271cd7606b5573

    • SHA256

      6a424fb0461a71270d9994efea75bced7b4081a1fe16cdc6deb1a8f015e81773

    • SHA512

      f0258f74d10b9d1f3cfab6c36afe7e411b9c3cea7641529b5fc3e62706787c9685b6dfccf3fdde708102b43f517a734572da77407f9f4f1d94754fdec1554748

    • SSDEEP

      49152:Z35SQwOGHHy3Gv6KelFCGDZPU542T5eYfn4jmnHwDKni5JsJ:ZpSQEHIKqFCGDZs54+5eYfnCMQ+i5Ja

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks