General

  • Target

    DCRatBuild.exe

  • Size

    1.3MB

  • Sample

    250107-tmalcszndl

  • MD5

    3cae6ba9349f77e982f0495a97dbe596

  • SHA1

    da7fd2dbb9fc13b40294e3f287e000e167d7fcf7

  • SHA256

    be6dac55f4e3588de5770d348b4b601440542d6a2ae1bc1fa97630849203ab01

  • SHA512

    e2425f01ba7f2566b4f91d623c2011de6cc13f9f9a78cdee3a1efc8f94fa5dd5ea32bdf7b30631dd27b512e2b9ca00b8569fe7610dd749f220375e8d10c8c758

  • SSDEEP

    24576:U2G/nvxW3Ww0tuBx4NP3a1tPTBI8mtei+Ya+B8TWKV:UbA30M4NO/K+Ya+Md

Malware Config

Targets

    • Target

      DCRatBuild.exe

    • Size

      1.3MB

    • MD5

      3cae6ba9349f77e982f0495a97dbe596

    • SHA1

      da7fd2dbb9fc13b40294e3f287e000e167d7fcf7

    • SHA256

      be6dac55f4e3588de5770d348b4b601440542d6a2ae1bc1fa97630849203ab01

    • SHA512

      e2425f01ba7f2566b4f91d623c2011de6cc13f9f9a78cdee3a1efc8f94fa5dd5ea32bdf7b30631dd27b512e2b9ca00b8569fe7610dd749f220375e8d10c8c758

    • SSDEEP

      24576:U2G/nvxW3Ww0tuBx4NP3a1tPTBI8mtei+Ya+B8TWKV:UbA30M4NO/K+Ya+Md

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks