General

  • Target

    3cc1119336bd3ffb21665cc3b66e7f9d4646f85da0da13a7c144235444a2447d.exe

  • Size

    1.7MB

  • Sample

    241218-ggxsgswjdz

  • MD5

    a556bf4a925150c916fde2eb12612af8

  • SHA1

    9b104cc1d99689e09b14ccff6a7d58b6a425131a

  • SHA256

    3cc1119336bd3ffb21665cc3b66e7f9d4646f85da0da13a7c144235444a2447d

  • SHA512

    c98deed1cdc21771fa39a8ba842ed6f284f3cb371ebbeeb04652fc6ad436a20b9e3fdcc9b7e0a4c29ac8ae8b45196268107c3db27db2e9343e7c9b537bc76161

  • SSDEEP

    49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvl:+THUxUoh1IF9gl2M

Malware Config

Targets

    • Target

      3cc1119336bd3ffb21665cc3b66e7f9d4646f85da0da13a7c144235444a2447d.exe

    • Size

      1.7MB

    • MD5

      a556bf4a925150c916fde2eb12612af8

    • SHA1

      9b104cc1d99689e09b14ccff6a7d58b6a425131a

    • SHA256

      3cc1119336bd3ffb21665cc3b66e7f9d4646f85da0da13a7c144235444a2447d

    • SHA512

      c98deed1cdc21771fa39a8ba842ed6f284f3cb371ebbeeb04652fc6ad436a20b9e3fdcc9b7e0a4c29ac8ae8b45196268107c3db27db2e9343e7c9b537bc76161

    • SSDEEP

      49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvl:+THUxUoh1IF9gl2M

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks