Resubmissions

10-12-2024 18:26

241210-w3hysasrbz 10

10-12-2024 18:23

241210-w1la5axqgp 10

General

  • Target

    7e65ab5afee261bd117db1d0de4ab3bae1f5eb82c591b41bf66f011300d565d2.exe

  • Size

    1.7MB

  • Sample

    241210-w3hysasrbz

  • MD5

    89b97de873721b7f7c0e290f3009714a

  • SHA1

    a497ecfd40010292888930dad8e90139555a53a1

  • SHA256

    7e65ab5afee261bd117db1d0de4ab3bae1f5eb82c591b41bf66f011300d565d2

  • SHA512

    48a4de3da13249137fac6c62df309a3be67c2123f689a0186fb48af00d2f60ab9faf1d2f7e865af9e3e3403f1d9abfee77386f92d7fb476a6717b10f2bc5d474

  • SSDEEP

    49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvX:eTHUxUoh1IF9gl2o

Malware Config

Targets

    • Target

      7e65ab5afee261bd117db1d0de4ab3bae1f5eb82c591b41bf66f011300d565d2.exe

    • Size

      1.7MB

    • MD5

      89b97de873721b7f7c0e290f3009714a

    • SHA1

      a497ecfd40010292888930dad8e90139555a53a1

    • SHA256

      7e65ab5afee261bd117db1d0de4ab3bae1f5eb82c591b41bf66f011300d565d2

    • SHA512

      48a4de3da13249137fac6c62df309a3be67c2123f689a0186fb48af00d2f60ab9faf1d2f7e865af9e3e3403f1d9abfee77386f92d7fb476a6717b10f2bc5d474

    • SSDEEP

      49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvX:eTHUxUoh1IF9gl2o

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks