General

  • Target

    nnneeeewww.exe

  • Size

    5.2MB

  • Sample

    241204-3rs3yatjck

  • MD5

    360bb48ef6acca7233580b6cb8b6a3a9

  • SHA1

    baf21bee8e1ec86b4e0b99a19ff869d3be8de292

  • SHA256

    c68964901508a7967bb32907bab8e273717e01d0c3195318a0fb6b0032157632

  • SHA512

    0380b0d64c18c42123838bf40aa75c8145a9a7b44bb3578d5e8e86870fee8ff70da5f07edbd13ceb8060388b5d94a39cd12df927a138115e4c9cf2ea45da9d48

  • SSDEEP

    98304:B7ITYiOxf286tRJkCNFoPqkk9RbXUyH5/B1YIe39eyJOkyYjufmS:BkTQx/6XKyFmq7RjH5//YIeoyJOkysul

Malware Config

Targets

    • Target

      nnneeeewww.exe

    • Size

      5.2MB

    • MD5

      360bb48ef6acca7233580b6cb8b6a3a9

    • SHA1

      baf21bee8e1ec86b4e0b99a19ff869d3be8de292

    • SHA256

      c68964901508a7967bb32907bab8e273717e01d0c3195318a0fb6b0032157632

    • SHA512

      0380b0d64c18c42123838bf40aa75c8145a9a7b44bb3578d5e8e86870fee8ff70da5f07edbd13ceb8060388b5d94a39cd12df927a138115e4c9cf2ea45da9d48

    • SSDEEP

      98304:B7ITYiOxf286tRJkCNFoPqkk9RbXUyH5/B1YIe39eyJOkyYjufmS:BkTQx/6XKyFmq7RjH5//YIeoyJOkysul

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks