General

  • Target

    a8ded05ad12e25c00518165ba83803e5cbe549e7dcbd5577ae48f831c57be6c5.exe

  • Size

    1.7MB

  • Sample

    250107-k5m5qswnbn

  • MD5

    6b21edfb72167ffb20e32f8dbbc7fb38

  • SHA1

    1f5411cd37262fca7a8b88ece06d8c78e8ec70fd

  • SHA256

    a8ded05ad12e25c00518165ba83803e5cbe549e7dcbd5577ae48f831c57be6c5

  • SHA512

    14a28825501056a1bfe94b0d86924c7f5f33c7fd985b467f6b16d3563d0929af625ee1bb761c4b7640195229e0d1ed1a2e80e3e531709b7108495d7f833866ac

  • SSDEEP

    49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvA:OTHUxUoh1IF9gl2V

Malware Config

Targets

    • Target

      a8ded05ad12e25c00518165ba83803e5cbe549e7dcbd5577ae48f831c57be6c5.exe

    • Size

      1.7MB

    • MD5

      6b21edfb72167ffb20e32f8dbbc7fb38

    • SHA1

      1f5411cd37262fca7a8b88ece06d8c78e8ec70fd

    • SHA256

      a8ded05ad12e25c00518165ba83803e5cbe549e7dcbd5577ae48f831c57be6c5

    • SHA512

      14a28825501056a1bfe94b0d86924c7f5f33c7fd985b467f6b16d3563d0929af625ee1bb761c4b7640195229e0d1ed1a2e80e3e531709b7108495d7f833866ac

    • SSDEEP

      49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvA:OTHUxUoh1IF9gl2V

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks