General

  • Target

    7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750

  • Size

    1.7MB

  • Sample

    241204-3v4c3stkfl

  • MD5

    688dfbd7ae580d677742065afa2f2991

  • SHA1

    9742697e260249d2380b8199856b030057670cd1

  • SHA256

    7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750

  • SHA512

    afc474710e071db0caf4d3fd89beddb2a5d6bbfa9e6b93fcd059a33191e66db9bb0b4f4fe0ac4baf5451936c0269a5b8b05355f2076f300bdf852b8a3fb32144

  • SSDEEP

    49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2

Malware Config

Targets

    • Target

      7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750

    • Size

      1.7MB

    • MD5

      688dfbd7ae580d677742065afa2f2991

    • SHA1

      9742697e260249d2380b8199856b030057670cd1

    • SHA256

      7dbbe0919357ceef595d52dc6723aad8c43ebb107952aa8f62dbf05e7682b750

    • SHA512

      afc474710e071db0caf4d3fd89beddb2a5d6bbfa9e6b93fcd059a33191e66db9bb0b4f4fe0ac4baf5451936c0269a5b8b05355f2076f300bdf852b8a3fb32144

    • SSDEEP

      49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks