General

  • Target

    44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe

  • Size

    2.5MB

  • Sample

    241126-wsjsbsyqel

  • MD5

    b5f270ac0ab872e6dd6c1c4775e2aba0

  • SHA1

    fd4c09df8d64150e250221ee1f709b7872fe67bb

  • SHA256

    44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019a

  • SHA512

    c8c6610d64e2f69884865f539e89d1d20ac5d1ccd63194bd1b72662136351d1f0466baa233fc7af7c423e9fb8e3083ece74007dcdb9d7e77a90cba4717afbb75

  • SSDEEP

    49152:WnYLYb30luEfXmrkLbZZ0McjfzJ47720B4ZjYsYt54AjaTWXHt:WnSYovmrkLbEjrJ477KZjkX4nTWXHt

Malware Config

Targets

    • Target

      44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019aN.exe

    • Size

      2.5MB

    • MD5

      b5f270ac0ab872e6dd6c1c4775e2aba0

    • SHA1

      fd4c09df8d64150e250221ee1f709b7872fe67bb

    • SHA256

      44b7291a319ab6e72eadf282dd7b3ba7a1b595e562d35f094de8d5ef12f1019a

    • SHA512

      c8c6610d64e2f69884865f539e89d1d20ac5d1ccd63194bd1b72662136351d1f0466baa233fc7af7c423e9fb8e3083ece74007dcdb9d7e77a90cba4717afbb75

    • SSDEEP

      49152:WnYLYb30luEfXmrkLbZZ0McjfzJ47720B4ZjYsYt54AjaTWXHt:WnSYovmrkLbEjrJ477KZjkX4nTWXHt

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks