General

  • Target

    8cd761b70594e7b18d547ebf4d7b713952fe90b3c42a828b23d28d59636270c6

  • Size

    1.3MB

  • Sample

    241221-tn47csspem

  • MD5

    51de70d1c8e260762721825b299d7086

  • SHA1

    c92442c444302da9c800ea5cc9331ccf22632e1b

  • SHA256

    8cd761b70594e7b18d547ebf4d7b713952fe90b3c42a828b23d28d59636270c6

  • SHA512

    99da60ff8ed745f8f1a5908f94a6c54b9d9352423287f0588cf564dc474c2c9c0f96cc6e3b40b7dbcd1f1bb94c100d9271fbb97c99a15e0a1e7c0e5ee1e2ef59

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      8cd761b70594e7b18d547ebf4d7b713952fe90b3c42a828b23d28d59636270c6

    • Size

      1.3MB

    • MD5

      51de70d1c8e260762721825b299d7086

    • SHA1

      c92442c444302da9c800ea5cc9331ccf22632e1b

    • SHA256

      8cd761b70594e7b18d547ebf4d7b713952fe90b3c42a828b23d28d59636270c6

    • SHA512

      99da60ff8ed745f8f1a5908f94a6c54b9d9352423287f0588cf564dc474c2c9c0f96cc6e3b40b7dbcd1f1bb94c100d9271fbb97c99a15e0a1e7c0e5ee1e2ef59

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks