General

  • Target

    d631d97e01717786e4b9e3bbafa89e90ce56d917a29697c8a7ed1cabd4d42073.exe

  • Size

    1.4MB

  • Sample

    241125-m6zw2atmaw

  • MD5

    b8324173f87ae8a5c69a1e3f7ce33e1a

  • SHA1

    882bec5816d33f1d1c58be5244e3c2dfbf62b184

  • SHA256

    d631d97e01717786e4b9e3bbafa89e90ce56d917a29697c8a7ed1cabd4d42073

  • SHA512

    dccd1c3d1f6bc33011e377bdd1fda0bca5116326de8b5b219d977e7d9c16ad214eaf717eabf2730bdacb3c68dce5aedeb5f459af58b27765bdab95549b7b9a14

  • SSDEEP

    24576:6oIREGQw97lGTIYskQyxNtGSKERqWzAcqGv+3spCElJz009I+LUy:gRdGcHkBxNYARdzAcqGv+cphlJzxVV

Malware Config

Targets

    • Target

      d631d97e01717786e4b9e3bbafa89e90ce56d917a29697c8a7ed1cabd4d42073.exe

    • Size

      1.4MB

    • MD5

      b8324173f87ae8a5c69a1e3f7ce33e1a

    • SHA1

      882bec5816d33f1d1c58be5244e3c2dfbf62b184

    • SHA256

      d631d97e01717786e4b9e3bbafa89e90ce56d917a29697c8a7ed1cabd4d42073

    • SHA512

      dccd1c3d1f6bc33011e377bdd1fda0bca5116326de8b5b219d977e7d9c16ad214eaf717eabf2730bdacb3c68dce5aedeb5f459af58b27765bdab95549b7b9a14

    • SSDEEP

      24576:6oIREGQw97lGTIYskQyxNtGSKERqWzAcqGv+3spCElJz009I+LUy:gRdGcHkBxNYARdzAcqGv+cphlJzxVV

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks