General

  • Target

    0.exe

  • Size

    108KB

  • Sample

    250108-khwtcsslgw

  • MD5

    978077216937f404216319f621dbb269

  • SHA1

    fe700220c4eb6fff630269ef33b77c2cb03aafec

  • SHA256

    7a86a58b8a42ea523077932cbe77e25ae21d209ba09b4a2984a0adb1e7702e9f

  • SHA512

    1c7eea824a6aef8aa56450f2c6904c751dda40b5ed48037672b2ed4d5745e2cb7d4d6ea83795ca53627d6ea53aa802046c78078bcd53420e6f6adff216d139f8

  • SSDEEP

    1536:a4Sr7mdaQV3Vgzmh4DnF2SofJY0CvFbIDCbGjpS9gDHBShm4XZ7ygAY:ir7d+gzCOnESp0iGjRCXhZL

Malware Config

Targets

    • Target

      0.exe

    • Size

      108KB

    • MD5

      978077216937f404216319f621dbb269

    • SHA1

      fe700220c4eb6fff630269ef33b77c2cb03aafec

    • SHA256

      7a86a58b8a42ea523077932cbe77e25ae21d209ba09b4a2984a0adb1e7702e9f

    • SHA512

      1c7eea824a6aef8aa56450f2c6904c751dda40b5ed48037672b2ed4d5745e2cb7d4d6ea83795ca53627d6ea53aa802046c78078bcd53420e6f6adff216d139f8

    • SSDEEP

      1536:a4Sr7mdaQV3Vgzmh4DnF2SofJY0CvFbIDCbGjpS9gDHBShm4XZ7ygAY:ir7d+gzCOnESp0iGjRCXhZL

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks