General

  • Target

    8b0b1728b6bcac3675b0e14ec262c061252bb9be0ac121d4342ac790ac96d51c

  • Size

    682KB

  • Sample

    241129-bebvcaxkhy

  • MD5

    054590792d65d5db6a5270d6ad965b93

  • SHA1

    bd04bb88a8ee09284e3e0eba53677f6b999d1b46

  • SHA256

    8b0b1728b6bcac3675b0e14ec262c061252bb9be0ac121d4342ac790ac96d51c

  • SHA512

    818e9a0ee0fa54874b811cd6fd5f61fc014508c84ec8f09f4d53b52a1f12a15a1b1cc516c35189352bc328c2cde659f969dfc6741b1319ba91689a2a19dce07e

  • SSDEEP

    12288:RqnO3mwJNoGFAgHCRvp1i/fjqJRYFInDrX/xTU3JgXDV6blx1wgtra7B:R+O3mwJnCRvEMxnDVSwgY

Malware Config

Targets

    • Target

      8b0b1728b6bcac3675b0e14ec262c061252bb9be0ac121d4342ac790ac96d51c

    • Size

      682KB

    • MD5

      054590792d65d5db6a5270d6ad965b93

    • SHA1

      bd04bb88a8ee09284e3e0eba53677f6b999d1b46

    • SHA256

      8b0b1728b6bcac3675b0e14ec262c061252bb9be0ac121d4342ac790ac96d51c

    • SHA512

      818e9a0ee0fa54874b811cd6fd5f61fc014508c84ec8f09f4d53b52a1f12a15a1b1cc516c35189352bc328c2cde659f969dfc6741b1319ba91689a2a19dce07e

    • SSDEEP

      12288:RqnO3mwJNoGFAgHCRvp1i/fjqJRYFInDrX/xTU3JgXDV6blx1wgtra7B:R+O3mwJnCRvEMxnDVSwgY

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks