General

  • Target

    448a30dbc1268d9564c96a74ca16bec832f6c11cc870b7daf3d024947e7e5ecaN.exe

  • Size

    1.7MB

  • Sample

    241222-bps7daxmas

  • MD5

    b09d4f8b9be1ca3790fafb6c5faf66a0

  • SHA1

    d17af72bde97583329a50fef411c3e3567b2578a

  • SHA256

    448a30dbc1268d9564c96a74ca16bec832f6c11cc870b7daf3d024947e7e5eca

  • SHA512

    8036dcf63d62b6e9af455087c8009b6e429c86283a5fa8459ba0cee600808802029d2e1ea9e2cd47d53eac290f99189b6c8c5a9b1b97eb20b99586985fbe4470

  • SSDEEP

    49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:OTHUxUoh1IF9gl2

Malware Config

Targets

    • Target

      448a30dbc1268d9564c96a74ca16bec832f6c11cc870b7daf3d024947e7e5ecaN.exe

    • Size

      1.7MB

    • MD5

      b09d4f8b9be1ca3790fafb6c5faf66a0

    • SHA1

      d17af72bde97583329a50fef411c3e3567b2578a

    • SHA256

      448a30dbc1268d9564c96a74ca16bec832f6c11cc870b7daf3d024947e7e5eca

    • SHA512

      8036dcf63d62b6e9af455087c8009b6e429c86283a5fa8459ba0cee600808802029d2e1ea9e2cd47d53eac290f99189b6c8c5a9b1b97eb20b99586985fbe4470

    • SSDEEP

      49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:OTHUxUoh1IF9gl2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks