General

  • Target

    4a7e93517c69ba331bd816159caa16524903ea49a8a2ea2b01e89f744894e6f0.zip

  • Size

    1.3MB

  • Sample

    241207-1yzsys1phm

  • MD5

    7a430006c4d2c7ecdffd1e0698f8b13a

  • SHA1

    90e4d8c00a12db86ffa44a232e80aa9abc4511a8

  • SHA256

    28053f0b254f2ecc8d8a74e4de2af17fa3d6a746fbecf7ac173891663c95f994

  • SHA512

    20708b3c6f3782c709237a02af1775124ecfb0065f76094339ec92e0a04357040a3db59192dca5b31bb8b7061e2cede1e894aa7c6997de5fb6b85d079ea93b63

  • SSDEEP

    24576:zkSSJ36G2CL8FEv55vrbl0bStR+BYcnSPqbNPPmcVQmmFqGOLbWVq3eJdgtJ:J1HFOriStR+BYmSPUphVQmUYLK0cgtJ

Malware Config

Targets

    • Target

      4a7e93517c69ba331bd816159caa16524903ea49a8a2ea2b01e89f744894e6f0.exe

    • Size

      1.8MB

    • MD5

      2f7a0b0d633254c477f9d8650d485d11

    • SHA1

      1ce7e5c3989077d2965d9aac2a256f9930e5b98f

    • SHA256

      4a7e93517c69ba331bd816159caa16524903ea49a8a2ea2b01e89f744894e6f0

    • SHA512

      b6141e51687d39942fb04f593c7bb2c0a7ec9e0bc53200f22e4d4c94fdb5ce55aed3169ca35d014fb746089bd2087f585ad3f057931642650ff0063195054299

    • SSDEEP

      49152:VbA3GzW8NA/VUPoFVwrIIV+DJGfZ19qigh:Vbs8NA/VUPoXIV+Dwbwfh

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks