General

  • Target

    b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205

  • Size

    4.2MB

  • Sample

    241128-wk4sja1jeq

  • MD5

    2608e3e0677de70d9e1eb6b108f7bdfd

  • SHA1

    c7d42a6abb29fcbde1cdc13f681d449ced6b8a50

  • SHA256

    b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205

  • SHA512

    e1664a02f3e0b101ada2ef5af8fdebc4b75aecc795c1fa04cab36e7b478c11516d8daba1f65159ad7d8c2b9680dd771fac5ba24218b861807851042f1ba82c9d

  • SSDEEP

    49152:2chlG/HMHyN4pAEx/7dvDhzETOIntW9y3yP2QAuxQzxEzwYjiwVTkO2kZBtk8hJq:

Malware Config

Targets

    • Target

      b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205

    • Size

      4.2MB

    • MD5

      2608e3e0677de70d9e1eb6b108f7bdfd

    • SHA1

      c7d42a6abb29fcbde1cdc13f681d449ced6b8a50

    • SHA256

      b02038aa2ee3194542d8e062aedcbb66015051ae31d5c0ec6a68dd7a26ef6205

    • SHA512

      e1664a02f3e0b101ada2ef5af8fdebc4b75aecc795c1fa04cab36e7b478c11516d8daba1f65159ad7d8c2b9680dd771fac5ba24218b861807851042f1ba82c9d

    • SSDEEP

      49152:2chlG/HMHyN4pAEx/7dvDhzETOIntW9y3yP2QAuxQzxEzwYjiwVTkO2kZBtk8hJq:

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks