General

  • Target

    85768ff86e86155faadff2443ea1c9656fc479ffa5f0ae90c9b738bf31ff1080.exe

  • Size

    1.3MB

  • Sample

    241205-da42fa1jgp

  • MD5

    3e30bd01f2053ee82162f5eca0faefe8

  • SHA1

    e5859be6a67c8d33a34707df9c13c8ddce6cc690

  • SHA256

    85768ff86e86155faadff2443ea1c9656fc479ffa5f0ae90c9b738bf31ff1080

  • SHA512

    ede7e3f18f0add3744b64955744067654a147e2f4dc33d7d4b9e82d02c7698ea3654ea4623a424729f1e6528314049e102aa2f74b223b16638276e758c5bb9e5

  • SSDEEP

    24576:A3HWfVXWNnnOtB3c20/vtKMpw7fuWppvKoxdO3zFuI:g2fWnnwa2qhcN/5xM

Malware Config

Targets

    • Target

      85768ff86e86155faadff2443ea1c9656fc479ffa5f0ae90c9b738bf31ff1080.exe

    • Size

      1.3MB

    • MD5

      3e30bd01f2053ee82162f5eca0faefe8

    • SHA1

      e5859be6a67c8d33a34707df9c13c8ddce6cc690

    • SHA256

      85768ff86e86155faadff2443ea1c9656fc479ffa5f0ae90c9b738bf31ff1080

    • SHA512

      ede7e3f18f0add3744b64955744067654a147e2f4dc33d7d4b9e82d02c7698ea3654ea4623a424729f1e6528314049e102aa2f74b223b16638276e758c5bb9e5

    • SSDEEP

      24576:A3HWfVXWNnnOtB3c20/vtKMpw7fuWppvKoxdO3zFuI:g2fWnnwa2qhcN/5xM

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks