General

  • Target

    54c52e6462d9cfd1a54b3c84fa21a9a2e2132b38af9ea6e6dc7a82a6fb3e4ace

  • Size

    1.3MB

  • Sample

    241221-vqqmestqgj

  • MD5

    38d5a8797e4da3916824a02eb0a22254

  • SHA1

    9865952c57da319285a9e254d4bb49a192f86479

  • SHA256

    54c52e6462d9cfd1a54b3c84fa21a9a2e2132b38af9ea6e6dc7a82a6fb3e4ace

  • SHA512

    221bb02d0b95c36192b083f992edd826334c43620482367718f1f09bee1073bb06ab2b3bb09d72d4de6ebfd7af2134d38a6e83b23bcd10d22f062d5cdd5bd865

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      54c52e6462d9cfd1a54b3c84fa21a9a2e2132b38af9ea6e6dc7a82a6fb3e4ace

    • Size

      1.3MB

    • MD5

      38d5a8797e4da3916824a02eb0a22254

    • SHA1

      9865952c57da319285a9e254d4bb49a192f86479

    • SHA256

      54c52e6462d9cfd1a54b3c84fa21a9a2e2132b38af9ea6e6dc7a82a6fb3e4ace

    • SHA512

      221bb02d0b95c36192b083f992edd826334c43620482367718f1f09bee1073bb06ab2b3bb09d72d4de6ebfd7af2134d38a6e83b23bcd10d22f062d5cdd5bd865

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks