General

  • Target

    65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe

  • Size

    1.4MB

  • Sample

    241222-lqt56stjfw

  • MD5

    4ad4cc9b5b82fc59756523b5b49da103

  • SHA1

    239321573ab48845b649af41908eecadd972dc04

  • SHA256

    65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c

  • SHA512

    96c8164723c4ada3ab78a63a94e8b35ed41bebdbdf1591f452453a0209f264120572e1c11e60962ca8b1e2fd96f686f1627eab94d0fbeb86e1c931d803a0ca4b

  • SSDEEP

    24576:U2G/nvxW3Ww0teOtQEIQ/E8pi63hn89pN3bfqaeTBHLChWFBAtlIBGIP5M:UbA30cn8Y6d89f3e5LhFSnIBhG

Malware Config

Targets

    • Target

      65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c.exe

    • Size

      1.4MB

    • MD5

      4ad4cc9b5b82fc59756523b5b49da103

    • SHA1

      239321573ab48845b649af41908eecadd972dc04

    • SHA256

      65fa57c7a8ac3956292be0a17e56f35fff14fb060cd6022889665901a6ecda5c

    • SHA512

      96c8164723c4ada3ab78a63a94e8b35ed41bebdbdf1591f452453a0209f264120572e1c11e60962ca8b1e2fd96f686f1627eab94d0fbeb86e1c931d803a0ca4b

    • SSDEEP

      24576:U2G/nvxW3Ww0teOtQEIQ/E8pi63hn89pN3bfqaeTBHLChWFBAtlIBGIP5M:UbA30cn8Y6d89f3e5LhFSnIBhG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks