Resubmissions

11-01-2025 22:42

250111-2m5qhavqar 10

11-01-2025 22:39

250111-2lgbhsvpdp 10

11-01-2025 22:29

250111-2effmssnft 10

General

  • Target

    DCRatBuild.exe

  • Size

    3.7MB

  • Sample

    250111-2lgbhsvpdp

  • MD5

    072756d824448388227ca413cf9b30fb

  • SHA1

    3774a14ae84e955c57a35f82da833d46cea22ed3

  • SHA256

    0043be0527169c370619ab57df3eefb66f7742e90449cfc952489d70fdbca59a

  • SHA512

    2a3953faddf9b6037a0a34499ac11011e4c22d931ba9e4ab174b0ebd7e1c1bade9546a6b970f6280402905159b42bcdc60c92a91e8dd39cd9ff14ddf73638a4d

  • SSDEEP

    98304:yQpUIa1ishqq/x4XR09rQVkREwySMEX+y:xpUIa0KFl9rnRHPZXF

Malware Config

Targets

    • Target

      DCRatBuild.exe

    • Size

      3.7MB

    • MD5

      072756d824448388227ca413cf9b30fb

    • SHA1

      3774a14ae84e955c57a35f82da833d46cea22ed3

    • SHA256

      0043be0527169c370619ab57df3eefb66f7742e90449cfc952489d70fdbca59a

    • SHA512

      2a3953faddf9b6037a0a34499ac11011e4c22d931ba9e4ab174b0ebd7e1c1bade9546a6b970f6280402905159b42bcdc60c92a91e8dd39cd9ff14ddf73638a4d

    • SSDEEP

      98304:yQpUIa1ishqq/x4XR09rQVkREwySMEX+y:xpUIa0KFl9rnRHPZXF

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks