General

  • Target

    d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce

  • Size

    2.5MB

  • Sample

    250106-y26dsswqaw

  • MD5

    2933b54db3817abdc91b58f70ae31b71

  • SHA1

    d4b7d3a213882a16e43b37472cf40b50b6573fde

  • SHA256

    d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce

  • SHA512

    a35552886749a4ee9d986f32a5128b81c8df83b152a40d23a16ab04e06e56873cf9b7ba90ebbaeaf14ebf08ce3504fe74941e88a6972eb376551b727725ff764

  • SSDEEP

    49152:VbA3GkdXjptfoI3eJIzQ6qTr7X3MFSu+L39lx:VbSXjptfoOeJ56qL8S9/

Malware Config

Targets

    • Target

      d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce

    • Size

      2.5MB

    • MD5

      2933b54db3817abdc91b58f70ae31b71

    • SHA1

      d4b7d3a213882a16e43b37472cf40b50b6573fde

    • SHA256

      d705a583afd303cbbbddc87d9f4de9387f2f5e10630f46ae4adee5ee5ff180ce

    • SHA512

      a35552886749a4ee9d986f32a5128b81c8df83b152a40d23a16ab04e06e56873cf9b7ba90ebbaeaf14ebf08ce3504fe74941e88a6972eb376551b727725ff764

    • SSDEEP

      49152:VbA3GkdXjptfoI3eJIzQ6qTr7X3MFSu+L39lx:VbSXjptfoOeJ56qL8S9/

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks