General

  • Target

    2f7a0b0d633254c477f9d8650d485d11.bin

  • Size

    1.3MB

  • Sample

    241209-bgvp8ssjcq

  • MD5

    8087a981baad58c7c2130e1fb7e8a6c2

  • SHA1

    38e1bdc74600f7165f3a1e2f81283e1948765235

  • SHA256

    a3390806bda587520138e55b210c67ed8253637d295a2ec6775a6b2ed17bbad3

  • SHA512

    253777bd495b07b9af1e8109fee6345646809b9413b7e2633c4e6f3833a1330f0d1202efa65a271ae9cb40d6d67ea366c897b4962ceb87c4b4345b879657d3b3

  • SSDEEP

    24576:KY315R6FhCkJZyyRw4zWCHhQ/laDfrqNVMUjG/hg61AVkBf+zpC7hvfh/PcF/k90:F3jIFpzrWCHu94fQVMN/uoBf+FCL+/c0

Malware Config

Targets

    • Target

      4a7e93517c69ba331bd816159caa16524903ea49a8a2ea2b01e89f744894e6f0.exe

    • Size

      1.8MB

    • MD5

      2f7a0b0d633254c477f9d8650d485d11

    • SHA1

      1ce7e5c3989077d2965d9aac2a256f9930e5b98f

    • SHA256

      4a7e93517c69ba331bd816159caa16524903ea49a8a2ea2b01e89f744894e6f0

    • SHA512

      b6141e51687d39942fb04f593c7bb2c0a7ec9e0bc53200f22e4d4c94fdb5ce55aed3169ca35d014fb746089bd2087f585ad3f057931642650ff0063195054299

    • SSDEEP

      49152:VbA3GzW8NA/VUPoFVwrIIV+DJGfZ19qigh:Vbs8NA/VUPoXIV+Dwbwfh

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks