General

  • Target

    45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d.exe

  • Size

    1.7MB

  • Sample

    241210-19b62axkap

  • MD5

    d6ece0dfc8c9c95e0cc2851ee372405d

  • SHA1

    2fd8432db75562aa867903b69f1e2c36bbac5fab

  • SHA256

    45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d

  • SHA512

    b9e47c3073a8d2dac54f6937491bc55a4c25c23066bbd08d8f5e5203258684ea17d6a3b65c45174c5a8426422c30422dd8773ee560f3fd874cd1a363f2336b27

  • SSDEEP

    49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKva:+THUxUoh1IF9gl2Z

Malware Config

Targets

    • Target

      45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d.exe

    • Size

      1.7MB

    • MD5

      d6ece0dfc8c9c95e0cc2851ee372405d

    • SHA1

      2fd8432db75562aa867903b69f1e2c36bbac5fab

    • SHA256

      45a89d2fb241df6bae2a79dc922fd124fe9b064512b9dd0806a7f0f633b1689d

    • SHA512

      b9e47c3073a8d2dac54f6937491bc55a4c25c23066bbd08d8f5e5203258684ea17d6a3b65c45174c5a8426422c30422dd8773ee560f3fd874cd1a363f2336b27

    • SSDEEP

      49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKva:+THUxUoh1IF9gl2Z

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks