General

  • Target

    5d232371c6b04bf6e609ee14fc06f3f6.bin

  • Size

    1.4MB

  • Sample

    250107-blmkesxjew

  • MD5

    c519741bd97e918a01b75e29682fdef6

  • SHA1

    b732fa3317e33b5c93c27816cca3362ed9ffb316

  • SHA256

    dbe0a12ddd61fa89d149ddc5fac4cf9cfec85fc64e7f29459d9c88049af8a0de

  • SHA512

    c505208fe042cbe7287e6a79cdb47841eb0a252b5c64f0ddbba1b50a204c52794ff89e2f79335f41c704f56134cb346d1ca1dccbc17dd81981447923fca0334f

  • SSDEEP

    24576:nq0qRt14pFzkiqcgqB+6CP3sYcn41jteMRQwJLig/IREhldJpb:njG1IzkZi+6qZc4Te5wJLiNSPR

Malware Config

Targets

    • Target

      05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1.exe

    • Size

      1.8MB

    • MD5

      5d232371c6b04bf6e609ee14fc06f3f6

    • SHA1

      d6b7e0e98b0bd964ce6b2256f7c3f52ea2ec39ba

    • SHA256

      05c4814add59df3a27d840a1494002ac0b0e49aa9348229bd9f438d87e3e56c1

    • SHA512

      18b7ae05853bbe0109b3f00861b97951a7963036bbe021b3a2ae178c810257033e249613e522c3a4c16ceaa415f3358b8a052c28f321c6128228f38367991cc6

    • SSDEEP

      49152:DT+08U5LLZTm94oY5RMRyAhpXDQt1UJo:DT8EL4I5EfG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks