General

  • Target

    ac032868836a24978e6da27b418e45a1be8415fe6a6e96970c7aeb4845c17aceN.exe

  • Size

    1.7MB

  • Sample

    241216-rv9pbaspbz

  • MD5

    8f1577b59c8f8b144134030e7f0952d0

  • SHA1

    6614cc712104223277965fdd29e5a47568fcaf56

  • SHA256

    ac032868836a24978e6da27b418e45a1be8415fe6a6e96970c7aeb4845c17ace

  • SHA512

    2471c441cd26577427799248823851f93604a771911ba302a7c6757c5602f9007d2c68364a69f0ba2accd7c48b7e8626c5cb19338a2cec1e31d2d844e4abc06f

  • SSDEEP

    49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2

Malware Config

Targets

    • Target

      ac032868836a24978e6da27b418e45a1be8415fe6a6e96970c7aeb4845c17aceN.exe

    • Size

      1.7MB

    • MD5

      8f1577b59c8f8b144134030e7f0952d0

    • SHA1

      6614cc712104223277965fdd29e5a47568fcaf56

    • SHA256

      ac032868836a24978e6da27b418e45a1be8415fe6a6e96970c7aeb4845c17ace

    • SHA512

      2471c441cd26577427799248823851f93604a771911ba302a7c6757c5602f9007d2c68364a69f0ba2accd7c48b7e8626c5cb19338a2cec1e31d2d844e4abc06f

    • SSDEEP

      49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:eTHUxUoh1IF9gl2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks