General

  • Target

    68eedbe52fc64fb9ddf1538f4bf8f35f9c885dfa8dd7cfe7c4842df80cd14e26.exe

  • Size

    783KB

  • Sample

    250111-s1j7aavnaq

  • MD5

    eae6302bb231f178cee1470e3908d592

  • SHA1

    5b1a08b2db405f2b0fb84ea235325d2243e0239f

  • SHA256

    68eedbe52fc64fb9ddf1538f4bf8f35f9c885dfa8dd7cfe7c4842df80cd14e26

  • SHA512

    c6b0353cdcfc1db4ddf12379c699aa4d555cbdcc02e4f59cb7b5921165e99b1e9560a29c80a1e6a951759729b6f83c90331db34380984f399cb4b31163c7195f

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKS:m+OQbpbgsFdAyQvzSqaq8qx

Malware Config

Targets

    • Target

      68eedbe52fc64fb9ddf1538f4bf8f35f9c885dfa8dd7cfe7c4842df80cd14e26.exe

    • Size

      783KB

    • MD5

      eae6302bb231f178cee1470e3908d592

    • SHA1

      5b1a08b2db405f2b0fb84ea235325d2243e0239f

    • SHA256

      68eedbe52fc64fb9ddf1538f4bf8f35f9c885dfa8dd7cfe7c4842df80cd14e26

    • SHA512

      c6b0353cdcfc1db4ddf12379c699aa4d555cbdcc02e4f59cb7b5921165e99b1e9560a29c80a1e6a951759729b6f83c90331db34380984f399cb4b31163c7195f

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKS:m+OQbpbgsFdAyQvzSqaq8qx

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks