General

  • Target

    e7e75f2ba01f39cba2de5fddf3072a0ec6aaa55bd583f3a910385a5370063272.exe

  • Size

    1.7MB

  • Sample

    241211-cxmv1a1qat

  • MD5

    fd2f835cbc87e966ad711028d848d14d

  • SHA1

    cceb6c9065ea8385e2d1c5c026366491d2f60f13

  • SHA256

    e7e75f2ba01f39cba2de5fddf3072a0ec6aaa55bd583f3a910385a5370063272

  • SHA512

    f6a9e29fd62178eb5ab867e77a1fd36f5591f8a7427d62038e0e247fb1274050f1028e5af93ab1bbbc5d42a8a8eab75f5d9290298322f1a3c7381e1e1fef53c5

  • SSDEEP

    49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvu:+THUxUoh1IF9gl2F

Malware Config

Targets

    • Target

      e7e75f2ba01f39cba2de5fddf3072a0ec6aaa55bd583f3a910385a5370063272.exe

    • Size

      1.7MB

    • MD5

      fd2f835cbc87e966ad711028d848d14d

    • SHA1

      cceb6c9065ea8385e2d1c5c026366491d2f60f13

    • SHA256

      e7e75f2ba01f39cba2de5fddf3072a0ec6aaa55bd583f3a910385a5370063272

    • SHA512

      f6a9e29fd62178eb5ab867e77a1fd36f5591f8a7427d62038e0e247fb1274050f1028e5af93ab1bbbc5d42a8a8eab75f5d9290298322f1a3c7381e1e1fef53c5

    • SSDEEP

      49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvu:+THUxUoh1IF9gl2F

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks