General

  • Target

    TearWeapon.exe

  • Size

    1.1MB

  • Sample

    241130-v14xsszlaz

  • MD5

    0c3a6b0190475de988ebaf0d788ae934

  • SHA1

    b611c57d25b733277fee96395bc2140c1b06b166

  • SHA256

    2d7c923ab1e4849fd6897512ea7763bbe2b8b12f58267d277ca7953f8fc08c86

  • SHA512

    b43c50a7e81924cd874c89a3084b42e45c41c95f1647da7848d901cc2279801c7f12b73fdd2c988bc1e528b63e249fac1941d3cc48aa699b6214247196a27d14

  • SSDEEP

    24576:U2G/nvxW3Ww0t16ZauSTtl1GuZZDZoL60:UbA301Tz1t2z

Malware Config

Targets

    • Target

      TearWeapon.exe

    • Size

      1.1MB

    • MD5

      0c3a6b0190475de988ebaf0d788ae934

    • SHA1

      b611c57d25b733277fee96395bc2140c1b06b166

    • SHA256

      2d7c923ab1e4849fd6897512ea7763bbe2b8b12f58267d277ca7953f8fc08c86

    • SHA512

      b43c50a7e81924cd874c89a3084b42e45c41c95f1647da7848d901cc2279801c7f12b73fdd2c988bc1e528b63e249fac1941d3cc48aa699b6214247196a27d14

    • SSDEEP

      24576:U2G/nvxW3Ww0t16ZauSTtl1GuZZDZoL60:UbA301Tz1t2z

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks