General

  • Target

    SupremeRust2.exe

  • Size

    1.1MB

  • Sample

    241219-s8ab2svpep

  • MD5

    e28c45bafa8d6655b3e00d7f12f136de

  • SHA1

    88914a952124b07bddb5d541f909bce07970336a

  • SHA256

    78042b29460b85b5547c297f3ce445437da033e58bdcc0bf1fa385eec73682a6

  • SHA512

    f2d9a72783617e3db0fb76d6627e902b2f8dc1045c3b69f22d4cb5c81d0ba49a15e532d18a4b0d46fba19ff962a9e0d525714acfecd2e76a8502d3e7179bb0b6

  • SSDEEP

    24576:U2G/nvxW3Ww0tVqWJHycfKPUofb1QwgVlf:UbA30wWdecVx

Malware Config

Targets

    • Target

      SupremeRust2.exe

    • Size

      1.1MB

    • MD5

      e28c45bafa8d6655b3e00d7f12f136de

    • SHA1

      88914a952124b07bddb5d541f909bce07970336a

    • SHA256

      78042b29460b85b5547c297f3ce445437da033e58bdcc0bf1fa385eec73682a6

    • SHA512

      f2d9a72783617e3db0fb76d6627e902b2f8dc1045c3b69f22d4cb5c81d0ba49a15e532d18a4b0d46fba19ff962a9e0d525714acfecd2e76a8502d3e7179bb0b6

    • SSDEEP

      24576:U2G/nvxW3Ww0tVqWJHycfKPUofb1QwgVlf:UbA30wWdecVx

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks