General

  • Target

    cfe5bf369e60e17054176b8926c7336e53d0489e1a65815610a794886d1d90d2N.exe

  • Size

    1.2MB

  • Sample

    250107-2ncfcaskd1

  • MD5

    77760d25680549a6e33d813225f15ae0

  • SHA1

    3ba98784170c929615f2a606c1865bbcca860140

  • SHA256

    cfe5bf369e60e17054176b8926c7336e53d0489e1a65815610a794886d1d90d2

  • SHA512

    6e758c1402852a2ee6c669208b491160eefb086c1b5bc52b698d9292ad933e8e71a66413e367b6f6c36f1df841e145b8ee5f06035deceba678a481279ebbcbac

  • SSDEEP

    24576:Zrtb29jyTS6MoaS0BPXM3l9HDesNM1w3HzjM4LjvTCdPILP+4:jb29j5jf/GB6eZLG

Malware Config

Targets

    • Target

      cfe5bf369e60e17054176b8926c7336e53d0489e1a65815610a794886d1d90d2N.exe

    • Size

      1.2MB

    • MD5

      77760d25680549a6e33d813225f15ae0

    • SHA1

      3ba98784170c929615f2a606c1865bbcca860140

    • SHA256

      cfe5bf369e60e17054176b8926c7336e53d0489e1a65815610a794886d1d90d2

    • SHA512

      6e758c1402852a2ee6c669208b491160eefb086c1b5bc52b698d9292ad933e8e71a66413e367b6f6c36f1df841e145b8ee5f06035deceba678a481279ebbcbac

    • SSDEEP

      24576:Zrtb29jyTS6MoaS0BPXM3l9HDesNM1w3HzjM4LjvTCdPILP+4:jb29j5jf/GB6eZLG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks