Resubmissions

14-01-2025 03:03

250114-dkgznaxmaq 10

General

  • Target

    b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4.exe

  • Size

    6.5MB

  • Sample

    250114-dkgznaxmaq

  • MD5

    dd045e7803ef620069b0e90d9128375f

  • SHA1

    983de7fc238cac0de7b2d74b86617501dbbfc9c6

  • SHA256

    b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4

  • SHA512

    3ef80acad4b09dbb84835520f249c3970f0574156e77155f496dddb46927d407773315f34c4c38277e34825ac6401159b5df06776140b20fb9f820f0a4859886

  • SSDEEP

    196608:nuaAxSTZLvD6/x1R92cJUMo7xS6eUEMW42:nRAh5n9/GMolS6eyWZ

Malware Config

Targets

    • Target

      b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4.exe

    • Size

      6.5MB

    • MD5

      dd045e7803ef620069b0e90d9128375f

    • SHA1

      983de7fc238cac0de7b2d74b86617501dbbfc9c6

    • SHA256

      b56efb3ca8906a817613e7e0899cffa1f5d23d39164153dc2567cf10a0314fb4

    • SHA512

      3ef80acad4b09dbb84835520f249c3970f0574156e77155f496dddb46927d407773315f34c4c38277e34825ac6401159b5df06776140b20fb9f820f0a4859886

    • SSDEEP

      196608:nuaAxSTZLvD6/x1R92cJUMo7xS6eUEMW42:nRAh5n9/GMolS6eyWZ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks