General

  • Target

    2a333680193e6b3f1847902f8de41cb85892e0bce4460a39cef5226ac89c4d1c.exe

  • Size

    1.7MB

  • Sample

    241207-jxjxnsyqhl

  • MD5

    b2b9f784a9e98c98a8ddd644eb168fa6

  • SHA1

    9e8c68675777a2718322ae626a5187d95e9d5210

  • SHA256

    2a333680193e6b3f1847902f8de41cb85892e0bce4460a39cef5226ac89c4d1c

  • SHA512

    d17d6ab45e162319bd30511019f7befa54e8aa245497d7bbc868043f851fbddbc5fb4aeb20f93aadc3e690c4a6b301ff763055513e5eed6e78f087610360f681

  • SSDEEP

    49152:/+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvD:STHUxUoh1IF9gl2M

Malware Config

Targets

    • Target

      2a333680193e6b3f1847902f8de41cb85892e0bce4460a39cef5226ac89c4d1c.exe

    • Size

      1.7MB

    • MD5

      b2b9f784a9e98c98a8ddd644eb168fa6

    • SHA1

      9e8c68675777a2718322ae626a5187d95e9d5210

    • SHA256

      2a333680193e6b3f1847902f8de41cb85892e0bce4460a39cef5226ac89c4d1c

    • SHA512

      d17d6ab45e162319bd30511019f7befa54e8aa245497d7bbc868043f851fbddbc5fb4aeb20f93aadc3e690c4a6b301ff763055513e5eed6e78f087610360f681

    • SSDEEP

      49152:/+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvD:STHUxUoh1IF9gl2M

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks