General

  • Target

    b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12.exe

  • Size

    1.7MB

  • Sample

    250110-y5qgrawjbz

  • MD5

    5f8fd8f1e910dd9061f1a5a1c3bf1f76

  • SHA1

    b6c997850b6358dea95e1c80f6920a57fb5098d4

  • SHA256

    b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12

  • SHA512

    efb4c860977a40978536b746ec5b372ca23c3fefd1b9a44ad1356fad414a0cfcf4695c7ba6c8b4a9f1c7242e7d72e81b0e9cf1686c08e265a493276be64149ab

  • SSDEEP

    24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ6:tgwuuEpdDLNwVMeXDL0fdSzAGr

Malware Config

Targets

    • Target

      b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12.exe

    • Size

      1.7MB

    • MD5

      5f8fd8f1e910dd9061f1a5a1c3bf1f76

    • SHA1

      b6c997850b6358dea95e1c80f6920a57fb5098d4

    • SHA256

      b132f19ab5f81b1b7fa86d8b35b1d8b69d0c10c097f817727625534bd4d1eb12

    • SHA512

      efb4c860977a40978536b746ec5b372ca23c3fefd1b9a44ad1356fad414a0cfcf4695c7ba6c8b4a9f1c7242e7d72e81b0e9cf1686c08e265a493276be64149ab

    • SSDEEP

      24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ6:tgwuuEpdDLNwVMeXDL0fdSzAGr

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks