General

  • Target

    0.exe

  • Size

    3.6MB

  • Sample

    250108-kn4fdssng1

  • MD5

    2fb7a00fca82d7cc33df9747370ada41

  • SHA1

    e15a485b27f8d43ecc624f018df5df4b54fe2781

  • SHA256

    5d397b2ae1f225f57933256265051b2629234b0068a9d3a0c16effa1afc120f9

  • SHA512

    e2b3d772dbeaa5b6faa17913b5a7dda356c0215d709a3492bb9bdd53c871cf595980083b33903161493b6bdfbbd384c1effefc4df966d245759ac85c04bbbb8a

  • SSDEEP

    98304:j+yA1ZY+BmmQuY7QwgSq6AWZ17O8YwDeJv8wVqwIlj03S:j+j7DAcw7zYwD88w4hm

Malware Config

Targets

    • Target

      0.exe

    • Size

      3.6MB

    • MD5

      2fb7a00fca82d7cc33df9747370ada41

    • SHA1

      e15a485b27f8d43ecc624f018df5df4b54fe2781

    • SHA256

      5d397b2ae1f225f57933256265051b2629234b0068a9d3a0c16effa1afc120f9

    • SHA512

      e2b3d772dbeaa5b6faa17913b5a7dda356c0215d709a3492bb9bdd53c871cf595980083b33903161493b6bdfbbd384c1effefc4df966d245759ac85c04bbbb8a

    • SSDEEP

      98304:j+yA1ZY+BmmQuY7QwgSq6AWZ17O8YwDeJv8wVqwIlj03S:j+j7DAcw7zYwD88w4hm

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks