General

  • Target

    05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe

  • Size

    1.8MB

  • Sample

    250106-chal5aslds

  • MD5

    5d232371c6b04bf6e609ee14fc06f3f6

  • SHA1

    d6b7e0e98b0bd964ce6b2256f7c3f52ea2ec39ba

  • SHA256

    05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1

  • SHA512

    18b7ae05853bbe0109b3f00861b97951a7963036bbe021b3a2ae178c810257033e249613e522c3a4c16ceaa415f3358b8a052c28f321c6128228f38367991cc6

  • SSDEEP

    49152:DT+08U5LLZTm94oY5RMRyAhpXDQt1UJo:DT8EL4I5EfG

Malware Config

Targets

    • Target

      05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe

    • Size

      1.8MB

    • MD5

      5d232371c6b04bf6e609ee14fc06f3f6

    • SHA1

      d6b7e0e98b0bd964ce6b2256f7c3f52ea2ec39ba

    • SHA256

      05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1

    • SHA512

      18b7ae05853bbe0109b3f00861b97951a7963036bbe021b3a2ae178c810257033e249613e522c3a4c16ceaa415f3358b8a052c28f321c6128228f38367991cc6

    • SSDEEP

      49152:DT+08U5LLZTm94oY5RMRyAhpXDQt1UJo:DT8EL4I5EfG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks