General

  • Target

    5789255e0df862f9c51546ab348e1570bf459dc836e0d3b67b493155cf87f383N.exe

  • Size

    1.7MB

  • Sample

    241207-gpamxsvndq

  • MD5

    8a0759f7965b2fd0495935ea7ddc0040

  • SHA1

    023336bef59c7ea574d784f201689d63f81045de

  • SHA256

    5789255e0df862f9c51546ab348e1570bf459dc836e0d3b67b493155cf87f383

  • SHA512

    544222b58f4abce10638aef33670e369caa14749590d0c756b1c48fd9c0dbc4648782b107351982965ddefa23b9a6f1dc6354353bf41c7ecc0903f597f3a8611

  • SSDEEP

    49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:OTHUxUoh1IF9gl2

Malware Config

Targets

    • Target

      5789255e0df862f9c51546ab348e1570bf459dc836e0d3b67b493155cf87f383N.exe

    • Size

      1.7MB

    • MD5

      8a0759f7965b2fd0495935ea7ddc0040

    • SHA1

      023336bef59c7ea574d784f201689d63f81045de

    • SHA256

      5789255e0df862f9c51546ab348e1570bf459dc836e0d3b67b493155cf87f383

    • SHA512

      544222b58f4abce10638aef33670e369caa14749590d0c756b1c48fd9c0dbc4648782b107351982965ddefa23b9a6f1dc6354353bf41c7ecc0903f597f3a8611

    • SSDEEP

      49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:OTHUxUoh1IF9gl2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks