General

  • Target

    854533e8d0bbf39a16975738f7d10dc32f776ad5a35963fc823796f5f780d41c.exe

  • Size

    1.7MB

  • Sample

    250111-3shnlaxmfk

  • MD5

    f2a682c815b566f24cddcaa11469c774

  • SHA1

    9fa7e11c793432e8aebfb2ed67bd3963dd5459ba

  • SHA256

    854533e8d0bbf39a16975738f7d10dc32f776ad5a35963fc823796f5f780d41c

  • SHA512

    95d46731c94157862fb2e45c23b5b2bf3e8718366a814f7e3c8270f89ad413f392df430088cffc80996ccab159cace9e18d4ff36ca1b6d0a183b75051f9431ec

  • SSDEEP

    24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ0:NgwuuEpdDLNwVMeXDL0fdSzAGH

Malware Config

Targets

    • Target

      854533e8d0bbf39a16975738f7d10dc32f776ad5a35963fc823796f5f780d41c.exe

    • Size

      1.7MB

    • MD5

      f2a682c815b566f24cddcaa11469c774

    • SHA1

      9fa7e11c793432e8aebfb2ed67bd3963dd5459ba

    • SHA256

      854533e8d0bbf39a16975738f7d10dc32f776ad5a35963fc823796f5f780d41c

    • SHA512

      95d46731c94157862fb2e45c23b5b2bf3e8718366a814f7e3c8270f89ad413f392df430088cffc80996ccab159cace9e18d4ff36ca1b6d0a183b75051f9431ec

    • SSDEEP

      24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ0:NgwuuEpdDLNwVMeXDL0fdSzAGH

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks