General

  • Target

    ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142.exe

  • Size

    984KB

  • Sample

    241210-1ypmzs1nht

  • MD5

    b6d8aa9bbde0aadb7ded1a4096540fe7

  • SHA1

    5e78b639c6a8ca53f03462c8bc5443429f1982ae

  • SHA256

    ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142

  • SHA512

    d24fb4771bb54f44dfd23505c491eca811aeb4ce14e40204a58849951f9c706e156683f228cb39e7aacb88323eceae8e2e3fb2328188f730aec097c672c0fa55

  • SSDEEP

    12288:MyEIOYTNEIf5AycvEhKIV6tEcln0Ai2a61h3cQ9Fk+ntGoWuzsx1oiLgoi:MyErYT+PvXIUln/1GJgoi

Malware Config

Targets

    • Target

      ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142.exe

    • Size

      984KB

    • MD5

      b6d8aa9bbde0aadb7ded1a4096540fe7

    • SHA1

      5e78b639c6a8ca53f03462c8bc5443429f1982ae

    • SHA256

      ef198c2bd03333e40dc6e723bb985f6507bc3e3662f0986a7db6ee0157ea7142

    • SHA512

      d24fb4771bb54f44dfd23505c491eca811aeb4ce14e40204a58849951f9c706e156683f228cb39e7aacb88323eceae8e2e3fb2328188f730aec097c672c0fa55

    • SSDEEP

      12288:MyEIOYTNEIf5AycvEhKIV6tEcln0Ai2a61h3cQ9Fk+ntGoWuzsx1oiLgoi:MyErYT+PvXIUln/1GJgoi

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks