General

  • Target

    dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969N.exe

  • Size

    1.7MB

  • Sample

    241208-dz7tmazpc1

  • MD5

    5c23172320d7107e9c3dfd6d6f0abbd0

  • SHA1

    97b7676138ca777520ca12a35eb63d71ca7953e6

  • SHA256

    dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969

  • SHA512

    a049b7045ddd94269fa367b4ebe533097376f4ec4ceccaa00c5a9d641bd145bee72ad3e1ed52e99425a8de1ac0f36314a38957cf397e20205607af88153ada80

  • SSDEEP

    49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2

Malware Config

Targets

    • Target

      dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969N.exe

    • Size

      1.7MB

    • MD5

      5c23172320d7107e9c3dfd6d6f0abbd0

    • SHA1

      97b7676138ca777520ca12a35eb63d71ca7953e6

    • SHA256

      dea6d6cb7f46f0236f831b99612a7ff6890871b5309292dbcf6801d6c06da969

    • SHA512

      a049b7045ddd94269fa367b4ebe533097376f4ec4ceccaa00c5a9d641bd145bee72ad3e1ed52e99425a8de1ac0f36314a38957cf397e20205607af88153ada80

    • SSDEEP

      49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks