General

  • Target

    5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe

  • Size

    1.3MB

  • Sample

    250107-pa55aasmaj

  • MD5

    0696b2076485f2e955ec0c5c31877340

  • SHA1

    4d9e6a3a94903be0ac72e0bf969cf5d5a42bc7e5

  • SHA256

    5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9

  • SHA512

    348d8de30402d5ff2105da4b2676d058f4061e071bbb94035a08a69407a6cac774b1692c477e1afb89de3e60acc263950eadb379f63fa374f9e5918a7a2a14ef

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Targets

    • Target

      5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe

    • Size

      1.3MB

    • MD5

      0696b2076485f2e955ec0c5c31877340

    • SHA1

      4d9e6a3a94903be0ac72e0bf969cf5d5a42bc7e5

    • SHA256

      5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9

    • SHA512

      348d8de30402d5ff2105da4b2676d058f4061e071bbb94035a08a69407a6cac774b1692c477e1afb89de3e60acc263950eadb379f63fa374f9e5918a7a2a14ef

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks