General

  • Target

    00d57c82d489efd105804faa3d6b5b5b70ab35502f2d75db07ccc63e113a86aa

  • Size

    1.3MB

  • Sample

    241221-vt4y8atpgz

  • MD5

    5e1b55b0e7169925005a58ed0e1dd601

  • SHA1

    500bf0dc6a8304e15013b3c0257f116a2296c7a3

  • SHA256

    00d57c82d489efd105804faa3d6b5b5b70ab35502f2d75db07ccc63e113a86aa

  • SHA512

    1d7798fbdc5454a5b17e6a88612f27a792f466f7893b13b370206d6695300177beda41dc16501a10434e326e19e23781ccad3577f6e13a74ccf34e8a2456c61f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      00d57c82d489efd105804faa3d6b5b5b70ab35502f2d75db07ccc63e113a86aa

    • Size

      1.3MB

    • MD5

      5e1b55b0e7169925005a58ed0e1dd601

    • SHA1

      500bf0dc6a8304e15013b3c0257f116a2296c7a3

    • SHA256

      00d57c82d489efd105804faa3d6b5b5b70ab35502f2d75db07ccc63e113a86aa

    • SHA512

      1d7798fbdc5454a5b17e6a88612f27a792f466f7893b13b370206d6695300177beda41dc16501a10434e326e19e23781ccad3577f6e13a74ccf34e8a2456c61f

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks