General

  • Target

    c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045

  • Size

    1.7MB

  • Sample

    241221-e88myssqbx

  • MD5

    9b3e774fdf342e63dc855ce00ba70555

  • SHA1

    2243b3e4cf15d76c33d7b791367002ddb929386d

  • SHA256

    c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045

  • SHA512

    d50374c8bae3c8c9d7e5abd3ca8494f0e458c9b99c444061291ea6efbc70e607d6036a647e25426da042243350cd36c49e68a2660b4b961310e26b40c00846f2

  • SSDEEP

    24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG

Malware Config

Targets

    • Target

      c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045

    • Size

      1.7MB

    • MD5

      9b3e774fdf342e63dc855ce00ba70555

    • SHA1

      2243b3e4cf15d76c33d7b791367002ddb929386d

    • SHA256

      c1d8febd8745bf2f6a446abc920b1c67f76b8f2980e65f4dca8512c70a0d6045

    • SHA512

      d50374c8bae3c8c9d7e5abd3ca8494f0e458c9b99c444061291ea6efbc70e607d6036a647e25426da042243350cd36c49e68a2660b4b961310e26b40c00846f2

    • SSDEEP

      24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks