General

  • Target

    b6ff1d14920aaa64ec52d0084291fd675d419fbe2c50b02584ebddbeed15cd80

  • Size

    1.3MB

  • Sample

    241221-wj8ebsvqdq

  • MD5

    0d5e03e18d3077212bc481423483ed69

  • SHA1

    56b7145103204387842eb202036a148c3ed92185

  • SHA256

    b6ff1d14920aaa64ec52d0084291fd675d419fbe2c50b02584ebddbeed15cd80

  • SHA512

    5b2802240070da9bf5a1f3448f28ede439a91e944a0aaf1faaedc022d44f5db8542b6f5dae168b92fad87e6ae4ad505ab07c0e82c9d4088cebd1e8b7ac8476c3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      b6ff1d14920aaa64ec52d0084291fd675d419fbe2c50b02584ebddbeed15cd80

    • Size

      1.3MB

    • MD5

      0d5e03e18d3077212bc481423483ed69

    • SHA1

      56b7145103204387842eb202036a148c3ed92185

    • SHA256

      b6ff1d14920aaa64ec52d0084291fd675d419fbe2c50b02584ebddbeed15cd80

    • SHA512

      5b2802240070da9bf5a1f3448f28ede439a91e944a0aaf1faaedc022d44f5db8542b6f5dae168b92fad87e6ae4ad505ab07c0e82c9d4088cebd1e8b7ac8476c3

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks