General

  • Target

    4667f5be1002ce912e5590cca8da93b6.bin

  • Size

    1.1MB

  • Sample

    241209-blh71asjhl

  • MD5

    ab00a5d9269b567fc983fdfb1873eed7

  • SHA1

    35aeacefadd0f5e62b9eaec2cd796e8e95a8b04e

  • SHA256

    ea35e9404c24a02e79df74209be0e4a5b7e5805683394c6b2d46b1feb37ac9b5

  • SHA512

    fecea5e95c7c476a40458763faff23a0e36e277d28d5d5cf069db496dc7b0a31049b0eac4f5e5965b6b49f660669c82273904b38ef935082b1f84486f1e95648

  • SSDEEP

    24576:8wmJqcMYrfZQYZ1K7BtEWp/SV24PwEK1ntlLAL6rrxPFVDGz:ejM2ZVZGCVs7L7l0LMrhDw

Malware Config

Targets

    • Target

      fcfa3c615b1c3c703e0ebfaf3fa68093b3894f4b9b7b5b37a5283e419f44022e.exe

    • Size

      1.5MB

    • MD5

      4667f5be1002ce912e5590cca8da93b6

    • SHA1

      2e408e483dd447b69d2e938218989265fbfdc2af

    • SHA256

      fcfa3c615b1c3c703e0ebfaf3fa68093b3894f4b9b7b5b37a5283e419f44022e

    • SHA512

      cdc57befaf7bad8917cc885b394f37d9dac3beabca5d07ab74cfee24f076dc088c2631ad2176dd7b9e62c555692b4c51e3280d5cf5d432ea5172db4ab8fa8c7f

    • SSDEEP

      24576:YvpWPh9nUNea6cQ/VUPoF/VPwrEDgbqeFrQqvvlsDJ+drpDn3fQK/759qiuiMjTP:+W8NA/VUPoFVwrIIV+DJGfZ19qig

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks