General

  • Target

    854b586f8d0cad52a042ccee32691dc9c30e6a32bd3805024934f43e169325af.exe

  • Size

    1.1MB

  • Sample

    241128-djmhraylfn

  • MD5

    1c40d9e61fbbd5d9054638b98b10e1cf

  • SHA1

    145119e649cabc6c60200643b3cc347fc4b164cc

  • SHA256

    854b586f8d0cad52a042ccee32691dc9c30e6a32bd3805024934f43e169325af

  • SHA512

    970eade0dce9dfaf5acdaf88721e55071fc48c4570c9a9b78c875d81fba54b047aed93412e331466a461662e065020f189b1dc1ec324b9394dd531ab2e3b3cf1

  • SSDEEP

    24576:TE9h8YY4mB7WnMSTdTvX+5pdKj30HZQHEGP:TeGYDmBcBpvEpdKj3W/i

Malware Config

Targets

    • Target

      854b586f8d0cad52a042ccee32691dc9c30e6a32bd3805024934f43e169325af.exe

    • Size

      1.1MB

    • MD5

      1c40d9e61fbbd5d9054638b98b10e1cf

    • SHA1

      145119e649cabc6c60200643b3cc347fc4b164cc

    • SHA256

      854b586f8d0cad52a042ccee32691dc9c30e6a32bd3805024934f43e169325af

    • SHA512

      970eade0dce9dfaf5acdaf88721e55071fc48c4570c9a9b78c875d81fba54b047aed93412e331466a461662e065020f189b1dc1ec324b9394dd531ab2e3b3cf1

    • SSDEEP

      24576:TE9h8YY4mB7WnMSTdTvX+5pdKj30HZQHEGP:TeGYDmBcBpvEpdKj3W/i

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks