General

  • Target

    94cafccc6d310401af379e3467365f53a66cf97a487cfbc9ea97974123a72f34.exe

  • Size

    1.7MB

  • Sample

    250116-btqxtavrcm

  • MD5

    2948e1b1cfd51feb20f6b458a1543fde

  • SHA1

    37bd03c0a2c3b781770e4f9deccf685a4d1b01dc

  • SHA256

    94cafccc6d310401af379e3467365f53a66cf97a487cfbc9ea97974123a72f34

  • SHA512

    de61333dfe517aba5560a71cf5e53aaf23dad6c7427fce27be02f3c12fcc6c16e59945aa4df91e60588cf475314ebe32df76c413ef210d5ad4fb51ae7af25641

  • SSDEEP

    24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJs:NgwuuEpdDLNwVMeXDL0fdSzAG5

Malware Config

Targets

    • Target

      94cafccc6d310401af379e3467365f53a66cf97a487cfbc9ea97974123a72f34.exe

    • Size

      1.7MB

    • MD5

      2948e1b1cfd51feb20f6b458a1543fde

    • SHA1

      37bd03c0a2c3b781770e4f9deccf685a4d1b01dc

    • SHA256

      94cafccc6d310401af379e3467365f53a66cf97a487cfbc9ea97974123a72f34

    • SHA512

      de61333dfe517aba5560a71cf5e53aaf23dad6c7427fce27be02f3c12fcc6c16e59945aa4df91e60588cf475314ebe32df76c413ef210d5ad4fb51ae7af25641

    • SSDEEP

      24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJs:NgwuuEpdDLNwVMeXDL0fdSzAG5

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks