General

  • Target

    b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe

  • Size

    784KB

  • Sample

    241220-gr4zjs1nhw

  • MD5

    bef287734f80e7484fb9279797e1ae80

  • SHA1

    894c68194b21095e41931a9c07b6213b2c81e19c

  • SHA256

    b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4ee

  • SHA512

    c1f8b33d14393fd91395bc2db4ed85c68288cf1d4d325343b280f74dad77d61a82eac9a78c3b341b40dee1ba35b3bd639e6ba14bd11f172b6ae5dc839f393571

  • SSDEEP

    12288:+qnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:++ORToOWSi5gBoS4wYUJ0eo2

Malware Config

Targets

    • Target

      b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4eeN.exe

    • Size

      784KB

    • MD5

      bef287734f80e7484fb9279797e1ae80

    • SHA1

      894c68194b21095e41931a9c07b6213b2c81e19c

    • SHA256

      b854d26ac067b0ed2c9e8f18a413039c09c564c429bc0a0cbaa020243921c4ee

    • SHA512

      c1f8b33d14393fd91395bc2db4ed85c68288cf1d4d325343b280f74dad77d61a82eac9a78c3b341b40dee1ba35b3bd639e6ba14bd11f172b6ae5dc839f393571

    • SSDEEP

      12288:+qnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:++ORToOWSi5gBoS4wYUJ0eo2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks