General

  • Target

    66c210cba75daafda60db6bf88b79098e1d8937759c21a218b10126b1d0af29f

  • Size

    1.3MB

  • Sample

    241221-vn7g6atqcm

  • MD5

    8ad2affe8977d20cb18b81d4565c6017

  • SHA1

    e7b50277342e0965c8643982ba3a3697401e4123

  • SHA256

    66c210cba75daafda60db6bf88b79098e1d8937759c21a218b10126b1d0af29f

  • SHA512

    fa90a9fafda1129852fdce8d0d6fee41e82aabef12ad43edae7a3f1ecc9428b4b52de24359bf7742a0a5605f37207fb472573ba4a0ee566b1930fbf5dce25d4b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      66c210cba75daafda60db6bf88b79098e1d8937759c21a218b10126b1d0af29f

    • Size

      1.3MB

    • MD5

      8ad2affe8977d20cb18b81d4565c6017

    • SHA1

      e7b50277342e0965c8643982ba3a3697401e4123

    • SHA256

      66c210cba75daafda60db6bf88b79098e1d8937759c21a218b10126b1d0af29f

    • SHA512

      fa90a9fafda1129852fdce8d0d6fee41e82aabef12ad43edae7a3f1ecc9428b4b52de24359bf7742a0a5605f37207fb472573ba4a0ee566b1930fbf5dce25d4b

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks