General

  • Target

    5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe

  • Size

    783KB

  • Sample

    241128-fkzktawndx

  • MD5

    308e34620e4b48c3ae64e4045a817229

  • SHA1

    d1312c2b2e9941f03f710af23e640cbfec175467

  • SHA256

    5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e

  • SHA512

    bfc03956208d26b6833c4d8a750041ac021f313f2e009ce009a381b6134e72f0003b2cbf8982d748587a21e249a45c3d21fb1daadd48521969830a37e5241d6d

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK2:G+OQbpbgsFdAyQvzSqaq8qt

Malware Config

Targets

    • Target

      5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e.exe

    • Size

      783KB

    • MD5

      308e34620e4b48c3ae64e4045a817229

    • SHA1

      d1312c2b2e9941f03f710af23e640cbfec175467

    • SHA256

      5cd4495d7ec85110670306ec9a23f14afa8ca4db6249585ce7b543c52250327e

    • SHA512

      bfc03956208d26b6833c4d8a750041ac021f313f2e009ce009a381b6134e72f0003b2cbf8982d748587a21e249a45c3d21fb1daadd48521969830a37e5241d6d

    • SSDEEP

      12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK2:G+OQbpbgsFdAyQvzSqaq8qt

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks