General

  • Target

    1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4

  • Size

    1.3MB

  • Sample

    241221-vl8x7stphj

  • MD5

    1eff34c713968be70953873e8674dbd6

  • SHA1

    8614954103af994d677e2ce040c65a9c57210b76

  • SHA256

    1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4

  • SHA512

    20c5a35850d9305252c80bb04be702fcf7dddc99cb72596458475d3ac4337b303924082aa6d57f3017ce97fbb0ab04000426d2065ed9550c49ddc04205b3fbc9

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4

    • Size

      1.3MB

    • MD5

      1eff34c713968be70953873e8674dbd6

    • SHA1

      8614954103af994d677e2ce040c65a9c57210b76

    • SHA256

      1dd55197686faec9166ce6ff1e7cd9a7950b95fdca49c20db273c0b6131c6cf4

    • SHA512

      20c5a35850d9305252c80bb04be702fcf7dddc99cb72596458475d3ac4337b303924082aa6d57f3017ce97fbb0ab04000426d2065ed9550c49ddc04205b3fbc9

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks