General

  • Target

    f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe.exe

  • Size

    2.7MB

  • Sample

    250111-f25s6aymdk

  • MD5

    917db17f1656134023dec1f54a66cfba

  • SHA1

    7b060b95b3e9a5d86c7a7452e21c855c32ba3c13

  • SHA256

    f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe

  • SHA512

    f9edae484f8d59202bb776a93b440a98aab9619f77464675d9d5e1e06d53fedf89c1aa4104b002312fe17081c7248837f2e002f7fe2e2509460a169174562207

  • SSDEEP

    49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK3:t4CF2sjELplCbmyN27PxEhQ+h

Malware Config

Targets

    • Target

      f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe.exe

    • Size

      2.7MB

    • MD5

      917db17f1656134023dec1f54a66cfba

    • SHA1

      7b060b95b3e9a5d86c7a7452e21c855c32ba3c13

    • SHA256

      f516c6f52dece526d88114f3fd79d989dc4d9fd096d880fab7142ef5188ef1fe

    • SHA512

      f9edae484f8d59202bb776a93b440a98aab9619f77464675d9d5e1e06d53fedf89c1aa4104b002312fe17081c7248837f2e002f7fe2e2509460a169174562207

    • SSDEEP

      49152:MDkZWCF2T8juUND4YQxZzfllulb0fnyN27mEGnjYEhQ+QK3:t4CF2sjELplCbmyN27PxEhQ+h

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks