General

  • Target

    f8cd2c9aa166be23955974effbf60aa6d3c7d4d7b65317f3a61229642a8a0d91.exe

  • Size

    783KB

  • Sample

    250115-2n4jtszkfk

  • MD5

    d1f8a9706cdd91485e3571bf4d3c2098

  • SHA1

    db09131e7267caa8157d4c74aceeb9644d5cdf5f

  • SHA256

    f8cd2c9aa166be23955974effbf60aa6d3c7d4d7b65317f3a61229642a8a0d91

  • SHA512

    d086b4bcb399ee372a6487eeb5c907480afc0b5919ec855c8923c9f7e962c510b980fe89ee409a8aa956e6920065f2cf3eaafc4c136b37bb2ba18a595a35fb4f

  • SSDEEP

    12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKa:G+OQbpbgsFdAyQvzSqaq8qV

Malware Config

Targets

    • Target

      f8cd2c9aa166be23955974effbf60aa6d3c7d4d7b65317f3a61229642a8a0d91.exe

    • Size

      783KB

    • MD5

      d1f8a9706cdd91485e3571bf4d3c2098

    • SHA1

      db09131e7267caa8157d4c74aceeb9644d5cdf5f

    • SHA256

      f8cd2c9aa166be23955974effbf60aa6d3c7d4d7b65317f3a61229642a8a0d91

    • SHA512

      d086b4bcb399ee372a6487eeb5c907480afc0b5919ec855c8923c9f7e962c510b980fe89ee409a8aa956e6920065f2cf3eaafc4c136b37bb2ba18a595a35fb4f

    • SSDEEP

      12288:GqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKa:G+OQbpbgsFdAyQvzSqaq8qV

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks