General

  • Target

    480b4364d0a3eb1ae10692a356c5328d9962ca46ee27a5cf410a45e64a715ec5

  • Size

    783KB

  • Sample

    250109-3wzfhsxkel

  • MD5

    bec6f80cbe19bc0a6c3ace4df89798ca

  • SHA1

    8312f1c7661df0a6f19eae8bc4dbca3511788b7d

  • SHA256

    480b4364d0a3eb1ae10692a356c5328d9962ca46ee27a5cf410a45e64a715ec5

  • SHA512

    bfd3f134ff63b0b977a4f87f438fb8fd263cb85ea0b1f77bb6b2ccaf3947eaec78fc50d94138efc5c36b6bd2b59a67ac240cd5d517bbde5b3a6b34173f65a1c6

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Targets

    • Target

      480b4364d0a3eb1ae10692a356c5328d9962ca46ee27a5cf410a45e64a715ec5

    • Size

      783KB

    • MD5

      bec6f80cbe19bc0a6c3ace4df89798ca

    • SHA1

      8312f1c7661df0a6f19eae8bc4dbca3511788b7d

    • SHA256

      480b4364d0a3eb1ae10692a356c5328d9962ca46ee27a5cf410a45e64a715ec5

    • SHA512

      bfd3f134ff63b0b977a4f87f438fb8fd263cb85ea0b1f77bb6b2ccaf3947eaec78fc50d94138efc5c36b6bd2b59a67ac240cd5d517bbde5b3a6b34173f65a1c6

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks