General

  • Target

    150550df367f8d6334843deee8de66a3.bin

  • Size

    595KB

  • Sample

    241208-bdhaqsyqek

  • MD5

    fa2616709f24a63e54b943307af012a6

  • SHA1

    7ef9399e3de00581342b5f96325cd57c8733fd5b

  • SHA256

    0ea1a8292aca1e59f3e6ac577ed72e2be6a6ed29ac8f45a702e13add14348776

  • SHA512

    8828adaf7c80d829de0b82f91020f0f4336147fd563dda3f77dd0a59df912e872e5a6a7536e82be35d41c2f2a8635c60d39dc5831fa4f3c962b2049aceb4fe72

  • SSDEEP

    12288:np/j3A0GBt8TfnEsmEjCyZAUdKH1/XYOuWKy3qsdU6ylJP3JgmGKi:n1rAZ8DE+j1Z7dW1w5DMqj6Q3emGKi

Malware Config

Targets

    • Target

      36fce76e89c0c4e4798956b61abad0e5e28e0732763699ce3c5003518b643496.exe

    • Size

      1.1MB

    • MD5

      150550df367f8d6334843deee8de66a3

    • SHA1

      8edcd7ff34e8c4a6cbc74fe57c831e5c400783f4

    • SHA256

      36fce76e89c0c4e4798956b61abad0e5e28e0732763699ce3c5003518b643496

    • SHA512

      427afc1255c109d47c1b879ba84c98225becd644cea03a4b926679381a73aeb6760bd974af558f667fd2588077ba701e8193a20c788bfd5a601dfa5f4712438c

    • SSDEEP

      24576:U2G/nvxW3Ww0tWumqZzVuY4G+bGGnHkUeaC6qEKKH8:UbA30iyuY4GEHkZ2KF

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks