General

  • Target

    240c067a9459024c61a46fe053ca99130e303f0d6239e385f8a2ff26ed52ef84N.exe

  • Size

    1.7MB

  • Sample

    241219-e2zfpsyqbl

  • MD5

    50699c5914ac35c234c6b67e35dc8db0

  • SHA1

    e563907f1f99293ef2e71b8beb673e7e4404ee5a

  • SHA256

    240c067a9459024c61a46fe053ca99130e303f0d6239e385f8a2ff26ed52ef84

  • SHA512

    081a456d5dfc28a833558b0fb9ed23f8b1196016f92937091db02a898a71724c2871c7f909eae3d35d6e4f8cf646e3f6cf4cb6191bc25820beeaab4737506a1b

  • SSDEEP

    49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2

Malware Config

Targets

    • Target

      240c067a9459024c61a46fe053ca99130e303f0d6239e385f8a2ff26ed52ef84N.exe

    • Size

      1.7MB

    • MD5

      50699c5914ac35c234c6b67e35dc8db0

    • SHA1

      e563907f1f99293ef2e71b8beb673e7e4404ee5a

    • SHA256

      240c067a9459024c61a46fe053ca99130e303f0d6239e385f8a2ff26ed52ef84

    • SHA512

      081a456d5dfc28a833558b0fb9ed23f8b1196016f92937091db02a898a71724c2871c7f909eae3d35d6e4f8cf646e3f6cf4cb6191bc25820beeaab4737506a1b

    • SSDEEP

      49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks