General

  • Target

    31248fd4ada468d2de870038a2b1cf235cb955e849e6aacc8537746902fbf209

  • Size

    1.3MB

  • Sample

    241221-v4gxfavjcz

  • MD5

    ca8ad19f9d4e74fcc8db660ff5e5528e

  • SHA1

    1b73e72ad3d7e892747d0abd4be450fc190ccdba

  • SHA256

    31248fd4ada468d2de870038a2b1cf235cb955e849e6aacc8537746902fbf209

  • SHA512

    023780ba4310930b3a88541d2c7b0acafab6e3a21c183fd1943dbaf3608e654f07b5090241b3480b6fe35546268b85ac3bcde15ea98f3e682868e6300f50f833

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      31248fd4ada468d2de870038a2b1cf235cb955e849e6aacc8537746902fbf209

    • Size

      1.3MB

    • MD5

      ca8ad19f9d4e74fcc8db660ff5e5528e

    • SHA1

      1b73e72ad3d7e892747d0abd4be450fc190ccdba

    • SHA256

      31248fd4ada468d2de870038a2b1cf235cb955e849e6aacc8537746902fbf209

    • SHA512

      023780ba4310930b3a88541d2c7b0acafab6e3a21c183fd1943dbaf3608e654f07b5090241b3480b6fe35546268b85ac3bcde15ea98f3e682868e6300f50f833

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks