General

  • Target

    2021A9779C45F35A46B1B28F2E9136FA.exe

  • Size

    2.8MB

  • Sample

    241213-12t2wazla1

  • MD5

    2021a9779c45f35a46b1b28f2e9136fa

  • SHA1

    76e03dfcc8732388fad4fd83b72b34cad50786ca

  • SHA256

    c8ea81ec0afa16e1e7c0bc325396be024c993479765a9e4ad26b29d83bbfb01a

  • SHA512

    5fc1617b672c308df2116cbfcd08e6d6b1c4969c3399dd9eb4c6d12a08bac23ac897c76de20cb1730fe44b50cf2bb840b11332f01f016ca1d4d6ab1bbdd19116

  • SSDEEP

    49152:7CFujkASUPVAIsINt8BCt3GSHBZTz0uBHTNS/lhv+8PUkYH4j:GFixPV9s4CqWQbzB+dc8BJj

Malware Config

Targets

    • Target

      2021A9779C45F35A46B1B28F2E9136FA.exe

    • Size

      2.8MB

    • MD5

      2021a9779c45f35a46b1b28f2e9136fa

    • SHA1

      76e03dfcc8732388fad4fd83b72b34cad50786ca

    • SHA256

      c8ea81ec0afa16e1e7c0bc325396be024c993479765a9e4ad26b29d83bbfb01a

    • SHA512

      5fc1617b672c308df2116cbfcd08e6d6b1c4969c3399dd9eb4c6d12a08bac23ac897c76de20cb1730fe44b50cf2bb840b11332f01f016ca1d4d6ab1bbdd19116

    • SSDEEP

      49152:7CFujkASUPVAIsINt8BCt3GSHBZTz0uBHTNS/lhv+8PUkYH4j:GFixPV9s4CqWQbzB+dc8BJj

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks