General

  • Target

    71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6

  • Size

    783KB

  • Sample

    250113-by4z8s1rhr

  • MD5

    cf1bfee7761c04cb3d6bac55fd17f8e9

  • SHA1

    626a9ced8310839072e9025f576060792efcdaae

  • SHA256

    71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6

  • SHA512

    db31cca344fa6b94591b55ab6aa918058f3165f11fe8dacde5f9513e8d8057714444ceea9d25db95ac5e112309ee16874ed6957569b9a9c8420c9cc7d72dc102

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

Malware Config

Targets

    • Target

      71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6

    • Size

      783KB

    • MD5

      cf1bfee7761c04cb3d6bac55fd17f8e9

    • SHA1

      626a9ced8310839072e9025f576060792efcdaae

    • SHA256

      71be20190eec5f61710bdd083137d72791c5d1bf47b06dc9f7748e297ad945a6

    • SHA512

      db31cca344fa6b94591b55ab6aa918058f3165f11fe8dacde5f9513e8d8057714444ceea9d25db95ac5e112309ee16874ed6957569b9a9c8420c9cc7d72dc102

    • SSDEEP

      12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:G+OQbpbgsFdAyQvzSqaq8q

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks