General

  • Target

    6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9.exe

  • Size

    2.5MB

  • Sample

    241126-akc4xstnet

  • MD5

    be9712de7e19243e35aa7ce6e2e23345

  • SHA1

    ac38c04570e5cd80627c28fa9fb5be0965f0f7c6

  • SHA256

    6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9

  • SHA512

    5a3178d5dce31eb0f64ffa104d17a7165775acfc78efa7f459e777ea56a005152f3b424532c6736f439bde45d2fd750f72583ba631e3d49a9eb8c2c6fc6542ae

  • SSDEEP

    49152:WnYLYb30luEfXmrkLbZZ0McjfzJ47720B4ZjYsYt54AjaTWXHtL:WnSYovmrkLbEjrJ477KZjkX4nTWXHtL

Malware Config

Targets

    • Target

      6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9.exe

    • Size

      2.5MB

    • MD5

      be9712de7e19243e35aa7ce6e2e23345

    • SHA1

      ac38c04570e5cd80627c28fa9fb5be0965f0f7c6

    • SHA256

      6bcef1348babeda5a1a126d6d076b2ab3bf793ec07da7aba3df963cb8ddad1b9

    • SHA512

      5a3178d5dce31eb0f64ffa104d17a7165775acfc78efa7f459e777ea56a005152f3b424532c6736f439bde45d2fd750f72583ba631e3d49a9eb8c2c6fc6542ae

    • SSDEEP

      49152:WnYLYb30luEfXmrkLbZZ0McjfzJ47720B4ZjYsYt54AjaTWXHtL:WnSYovmrkLbEjrJ477KZjkX4nTWXHtL

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks