General

  • Target

    1bf3abfa85526d042d39d615fd7ddbc918700661c833dc62e1886988099afbc2

  • Size

    1.3MB

  • Sample

    241221-tvyyxssrek

  • MD5

    0d9f1cbbbf3e97707ba0d93f687f5084

  • SHA1

    640dc93001c6255c5651760fc641d3cd222cbd20

  • SHA256

    1bf3abfa85526d042d39d615fd7ddbc918700661c833dc62e1886988099afbc2

  • SHA512

    1089a5fe74212a1f056e8badda31273afb16a75bae6993230f6e21a4ef2a2f0c498701e0e9c228ddc05b64032d67dcd9f490cb714f261063c40ea42e4399d9cf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      1bf3abfa85526d042d39d615fd7ddbc918700661c833dc62e1886988099afbc2

    • Size

      1.3MB

    • MD5

      0d9f1cbbbf3e97707ba0d93f687f5084

    • SHA1

      640dc93001c6255c5651760fc641d3cd222cbd20

    • SHA256

      1bf3abfa85526d042d39d615fd7ddbc918700661c833dc62e1886988099afbc2

    • SHA512

      1089a5fe74212a1f056e8badda31273afb16a75bae6993230f6e21a4ef2a2f0c498701e0e9c228ddc05b64032d67dcd9f490cb714f261063c40ea42e4399d9cf

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks