General

  • Target

    b3b5e03f84d34eb050580e5aa00f4324af3134b1a4d2aa4053a81824cef162c8.exe

  • Size

    1.1MB

  • Sample

    250108-dgsa8a1mgv

  • MD5

    5512b3a1a182131b7829c06e8b3ab318

  • SHA1

    0eecd6925320b80af74c18a162e8313885dec8f4

  • SHA256

    b3b5e03f84d34eb050580e5aa00f4324af3134b1a4d2aa4053a81824cef162c8

  • SHA512

    5322426d7490e21ac960987479c8401ec58fb8b9b8dcddaf8145c2177c7a48531f02485e1583fd2801652814ef7b2145bab79558d6589af8c8dc614149afe987

  • SSDEEP

    24576:U2G/nvxW3Ww0t03QsZQWzGPrR12EVMiLIc:UbA3003HqW0R12EZ

Malware Config

Targets

    • Target

      b3b5e03f84d34eb050580e5aa00f4324af3134b1a4d2aa4053a81824cef162c8.exe

    • Size

      1.1MB

    • MD5

      5512b3a1a182131b7829c06e8b3ab318

    • SHA1

      0eecd6925320b80af74c18a162e8313885dec8f4

    • SHA256

      b3b5e03f84d34eb050580e5aa00f4324af3134b1a4d2aa4053a81824cef162c8

    • SHA512

      5322426d7490e21ac960987479c8401ec58fb8b9b8dcddaf8145c2177c7a48531f02485e1583fd2801652814ef7b2145bab79558d6589af8c8dc614149afe987

    • SSDEEP

      24576:U2G/nvxW3Ww0t03QsZQWzGPrR12EVMiLIc:UbA3003HqW0R12EZ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks