General

  • Target

    7f632feb26dcbc39bc00ddb8204cbed76b9c937d29f4635feb0d2deea64c07a8N

  • Size

    1.7MB

  • Sample

    250113-s86egsxmgx

  • MD5

    6d5faed87aba710c68377628f3cd1ad0

  • SHA1

    95e477a9a047e2bf841e7ff88d484fbdc33c9182

  • SHA256

    7f632feb26dcbc39bc00ddb8204cbed76b9c937d29f4635feb0d2deea64c07a8

  • SHA512

    c4c5877da078e10e38391ab0d233815b41306ba9f7660a5a7bb3d5a5b9d82733a33411b29408a177798c35047ad8aa784c02bb32aa641d1d5fb633800b8a03de

  • SSDEEP

    49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2

Malware Config

Targets

    • Target

      7f632feb26dcbc39bc00ddb8204cbed76b9c937d29f4635feb0d2deea64c07a8N

    • Size

      1.7MB

    • MD5

      6d5faed87aba710c68377628f3cd1ad0

    • SHA1

      95e477a9a047e2bf841e7ff88d484fbdc33c9182

    • SHA256

      7f632feb26dcbc39bc00ddb8204cbed76b9c937d29f4635feb0d2deea64c07a8

    • SHA512

      c4c5877da078e10e38391ab0d233815b41306ba9f7660a5a7bb3d5a5b9d82733a33411b29408a177798c35047ad8aa784c02bb32aa641d1d5fb633800b8a03de

    • SSDEEP

      49152:T+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:+THUxUoh1IF9gl2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks