General

  • Target

    d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676.exe

  • Size

    3.4MB

  • Sample

    241211-gc6vlayrc1

  • MD5

    54454792b2656605daffe22adb7750c0

  • SHA1

    14bc4b6c3b169b26efcb22b9dd913c9bdcb25c61

  • SHA256

    d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676

  • SHA512

    279c5bd9e09e45e86df9cd2421aa0a61f724ad8332e0f5409d33ed2ecea4ad4b38ed9c71e67184f08ff23088df5652d75afbb793eded50ef8230effd2597b679

  • SSDEEP

    49152:s3GMesEktOcTPuKyI1qd5i6JTnl9gs6ToWbepfutWiNFg20+5J3pS8Dzy8:nuEktPuu1qbhwDoWHgt+5JZS8fy8

Malware Config

Targets

    • Target

      d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676.exe

    • Size

      3.4MB

    • MD5

      54454792b2656605daffe22adb7750c0

    • SHA1

      14bc4b6c3b169b26efcb22b9dd913c9bdcb25c61

    • SHA256

      d37a1b95368b3ba6cb549ee14af0e69891ad7b5f66e49f919f0e7e527532e676

    • SHA512

      279c5bd9e09e45e86df9cd2421aa0a61f724ad8332e0f5409d33ed2ecea4ad4b38ed9c71e67184f08ff23088df5652d75afbb793eded50ef8230effd2597b679

    • SSDEEP

      49152:s3GMesEktOcTPuKyI1qd5i6JTnl9gs6ToWbepfutWiNFg20+5J3pS8Dzy8:nuEktPuu1qbhwDoWHgt+5JZS8fy8

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks