General

  • Target

    private.exe

  • Size

    854KB

  • Sample

    250115-gavdsavjhl

  • MD5

    53e14b277744d3c61cffb17f39ede98d

  • SHA1

    c8482d3ec8cb10df2d9f660920ab5d839d6e450f

  • SHA256

    f8b5a7f99a109c3bc007a3ef1e6fbbacbb0fae70951c3b020704df3106a54654

  • SHA512

    140dffe4e715ccaeec37ae3da9734c0fbd2b6b1e4337d75621dc8714ec13ab572cc2ee5885a1ec196758637f27ac50ff3970396db5c20885234a4a2e1e47c8fb

  • SSDEEP

    12288:Hnt46d+ktbUluYV/YH7Fso6veRSN2ff+zOe9egX7AlGq+nqnIr9BqiXb1FP:Hnt46Qi4ue/Do60OegX7Aoq+nmm7Vj

Malware Config

Targets

    • Target

      private.exe

    • Size

      854KB

    • MD5

      53e14b277744d3c61cffb17f39ede98d

    • SHA1

      c8482d3ec8cb10df2d9f660920ab5d839d6e450f

    • SHA256

      f8b5a7f99a109c3bc007a3ef1e6fbbacbb0fae70951c3b020704df3106a54654

    • SHA512

      140dffe4e715ccaeec37ae3da9734c0fbd2b6b1e4337d75621dc8714ec13ab572cc2ee5885a1ec196758637f27ac50ff3970396db5c20885234a4a2e1e47c8fb

    • SSDEEP

      12288:Hnt46d+ktbUluYV/YH7Fso6veRSN2ff+zOe9egX7AlGq+nqnIr9BqiXb1FP:Hnt46Qi4ue/Do60OegX7Aoq+nmm7Vj

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks