General

  • Target

    916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9

  • Size

    1.7MB

  • Sample

    241221-c6r63s1lcq

  • MD5

    7a6337d1705c5b4e696b224c29fc5233

  • SHA1

    5631625b8754ac8e02f9b441a47b229ac37a6cbc

  • SHA256

    916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9

  • SHA512

    7727e5546724c46ac6c481989860e93f7b0e4537a0fc8a1d8595657181c985213f794390f0198a4a69f7b19f999b4bfef5d044f2a6fd2ecc51be119207753efe

  • SSDEEP

    24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG

Malware Config

Targets

    • Target

      916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9

    • Size

      1.7MB

    • MD5

      7a6337d1705c5b4e696b224c29fc5233

    • SHA1

      5631625b8754ac8e02f9b441a47b229ac37a6cbc

    • SHA256

      916a143563e75f975b628b8201560e7e870a7b0ae9684b1d1637884f7f30eeb9

    • SHA512

      7727e5546724c46ac6c481989860e93f7b0e4537a0fc8a1d8595657181c985213f794390f0198a4a69f7b19f999b4bfef5d044f2a6fd2ecc51be119207753efe

    • SSDEEP

      24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks