Resubmissions

08-12-2024 01:23

241208-br3tlavkct 10

08-12-2024 01:17

241208-bnw7mstrgy 10

General

  • Target

    PlagueCrack.exe

  • Size

    726KB

  • Sample

    241208-bnw7mstrgy

  • MD5

    2163c9e0594f85f2088c2d20d17ffe4d

  • SHA1

    f86e2843a28743422b01873f074b6cfa1421656c

  • SHA256

    8870af0fd4d3c26a84b1eb1cd6b34e1e1fccb0ba4058189b544efad768e4ec39

  • SHA512

    53ac098dc91e088fc92ad16735932a0a091a9ea8ff400bd4abe41ebff9a375c5cf2e3396b3f18d41138185f0c31277d5bf4d0c4330abd9e99ebda05400d6f111

  • SSDEEP

    12288:KpoIY///1UFZrXC6EBOqD4f29U4nlEyf9cRUHIoqD:9IY/Q7SBkMaqcRUo

Malware Config

Targets

    • Target

      PlagueCrack.exe

    • Size

      726KB

    • MD5

      2163c9e0594f85f2088c2d20d17ffe4d

    • SHA1

      f86e2843a28743422b01873f074b6cfa1421656c

    • SHA256

      8870af0fd4d3c26a84b1eb1cd6b34e1e1fccb0ba4058189b544efad768e4ec39

    • SHA512

      53ac098dc91e088fc92ad16735932a0a091a9ea8ff400bd4abe41ebff9a375c5cf2e3396b3f18d41138185f0c31277d5bf4d0c4330abd9e99ebda05400d6f111

    • SSDEEP

      12288:KpoIY///1UFZrXC6EBOqD4f29U4nlEyf9cRUHIoqD:9IY/Q7SBkMaqcRUo

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks