General

  • Target

    dbd701c84a986548500e83ef3f7ad3ae832aa20660dcf2a3b10ba81263830f54

  • Size

    1.7MB

  • Sample

    241201-egs37a1jbl

  • MD5

    90f12351f5b3d8a454e577a700d050e7

  • SHA1

    54cd67455b129f4de02a08d46e7d3c6526136afa

  • SHA256

    dbd701c84a986548500e83ef3f7ad3ae832aa20660dcf2a3b10ba81263830f54

  • SHA512

    5a550068b7466e263048f86950da97bfcdb76580f556b3a9187957926a6535ebb3684ad7c1b276c06fdf337b0fd9676f8d39618562e15bf8814e756ff8e8ae44

  • SSDEEP

    24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG

Malware Config

Targets

    • Target

      dbd701c84a986548500e83ef3f7ad3ae832aa20660dcf2a3b10ba81263830f54

    • Size

      1.7MB

    • MD5

      90f12351f5b3d8a454e577a700d050e7

    • SHA1

      54cd67455b129f4de02a08d46e7d3c6526136afa

    • SHA256

      dbd701c84a986548500e83ef3f7ad3ae832aa20660dcf2a3b10ba81263830f54

    • SHA512

      5a550068b7466e263048f86950da97bfcdb76580f556b3a9187957926a6535ebb3684ad7c1b276c06fdf337b0fd9676f8d39618562e15bf8814e756ff8e8ae44

    • SSDEEP

      24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks