General

  • Target

    0ba179fecafc8c823fcd576e0d2f31fff23072e64dbeffb0a2c7d42631cacc0d.exe

  • Size

    1.2MB

  • Sample

    250107-p5p2jstnep

  • MD5

    3e486391221891462495325b3bbf8b13

  • SHA1

    c65d92a465ec8967a7fba171ac6e62f3aaae2ff0

  • SHA256

    0ba179fecafc8c823fcd576e0d2f31fff23072e64dbeffb0a2c7d42631cacc0d

  • SHA512

    066ebb9cdfe3b45f893ec031237319d49a1d323e1f928a2ffde324e718adef84bb6c397f2cc12814a069ea71106b44996abf538ac2b8bd7e456cfc3ec76138ff

  • SSDEEP

    24576:Zrtb29jyTS6MoaS0BPXM3l9HDesNM1w3HzjM4LjvTCdPILP+4h:jb29j5jf/GB6eZLGo

Malware Config

Targets

    • Target

      0ba179fecafc8c823fcd576e0d2f31fff23072e64dbeffb0a2c7d42631cacc0d.exe

    • Size

      1.2MB

    • MD5

      3e486391221891462495325b3bbf8b13

    • SHA1

      c65d92a465ec8967a7fba171ac6e62f3aaae2ff0

    • SHA256

      0ba179fecafc8c823fcd576e0d2f31fff23072e64dbeffb0a2c7d42631cacc0d

    • SHA512

      066ebb9cdfe3b45f893ec031237319d49a1d323e1f928a2ffde324e718adef84bb6c397f2cc12814a069ea71106b44996abf538ac2b8bd7e456cfc3ec76138ff

    • SSDEEP

      24576:Zrtb29jyTS6MoaS0BPXM3l9HDesNM1w3HzjM4LjvTCdPILP+4h:jb29j5jf/GB6eZLGo

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks