General

  • Target

    e218369280704cdfefe3390d90b8f1918dd4c215879b6ad12f1fee1b40550345.exe

  • Size

    1.7MB

  • Sample

    241217-1d62jazldp

  • MD5

    d337a1cc8b6b0d9f1c16ec727b3197e2

  • SHA1

    01dbeb18baa4efb70b3a30930e08d89e2e25c05a

  • SHA256

    e218369280704cdfefe3390d90b8f1918dd4c215879b6ad12f1fee1b40550345

  • SHA512

    d20493b21aceb61d5e8c49afa8cd0cdd14234b9b3d94d4f8af92f0b64cb4542fc154cd29339b1f56abae14c97b752f8f6b81d6e86e301c3576117fa510879285

  • SSDEEP

    49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvV:eTHUxUoh1IF9gl2e

Malware Config

Targets

    • Target

      e218369280704cdfefe3390d90b8f1918dd4c215879b6ad12f1fee1b40550345.exe

    • Size

      1.7MB

    • MD5

      d337a1cc8b6b0d9f1c16ec727b3197e2

    • SHA1

      01dbeb18baa4efb70b3a30930e08d89e2e25c05a

    • SHA256

      e218369280704cdfefe3390d90b8f1918dd4c215879b6ad12f1fee1b40550345

    • SHA512

      d20493b21aceb61d5e8c49afa8cd0cdd14234b9b3d94d4f8af92f0b64cb4542fc154cd29339b1f56abae14c97b752f8f6b81d6e86e301c3576117fa510879285

    • SSDEEP

      49152:z+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvV:eTHUxUoh1IF9gl2e

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks