General

  • Target

    3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d

  • Size

    2.7MB

  • Sample

    250106-xx4tqsxjej

  • MD5

    d553e626715bbdc6ef966fb1cbc7e0ce

  • SHA1

    7dd91961404f829e09c288c7fccbc73867427677

  • SHA256

    3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d

  • SHA512

    478ab0da4b2f4cb11647783afed6bd52404fe2ddb198a5dc8de5846ec3406c6895365e13168fa9667c9af5c244fd772da1e716376eac656fdcb6836d74475d5a

  • SSDEEP

    49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK:t4CF2sjELplCbmyN27PxEhQ+

Malware Config

Targets

    • Target

      3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d

    • Size

      2.7MB

    • MD5

      d553e626715bbdc6ef966fb1cbc7e0ce

    • SHA1

      7dd91961404f829e09c288c7fccbc73867427677

    • SHA256

      3f259715f8b59d89ac6b64384ca7083bd393d91e499f8e1252d284147a91021d

    • SHA512

      478ab0da4b2f4cb11647783afed6bd52404fe2ddb198a5dc8de5846ec3406c6895365e13168fa9667c9af5c244fd772da1e716376eac656fdcb6836d74475d5a

    • SSDEEP

      49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK:t4CF2sjELplCbmyN27PxEhQ+

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks