General

  • Target

    f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe

  • Size

    2.7MB

  • Sample

    250116-g1zfesxlhn

  • MD5

    7c935427ecd47e8deb5ce641226d8980

  • SHA1

    963be2aa84776697aabe1e77d9b0596ba3ff0020

  • SHA256

    f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0da

  • SHA512

    1afb5e8f858b71fa3efdf0acfd38855d735b928388866e19396b86a874b69b45b00ebbdde233f4fddce2c04eb14acb137acf511e335d327aeb7f98f6d9ac27b2

  • SSDEEP

    49152:5H3ow5/6oEcY2I6DxCP2vAWJ6ZsSVnJTXretG/Q1Hciyc5nIudabGm:5j/NDB9m2v9JqVJ7OG/Q18irfdabGm

Malware Config

Targets

    • Target

      f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0daN.exe

    • Size

      2.7MB

    • MD5

      7c935427ecd47e8deb5ce641226d8980

    • SHA1

      963be2aa84776697aabe1e77d9b0596ba3ff0020

    • SHA256

      f6d9e0292d18f4cc7fde4f34bd9722276a570f94bd6586392bc94fc6380ec0da

    • SHA512

      1afb5e8f858b71fa3efdf0acfd38855d735b928388866e19396b86a874b69b45b00ebbdde233f4fddce2c04eb14acb137acf511e335d327aeb7f98f6d9ac27b2

    • SSDEEP

      49152:5H3ow5/6oEcY2I6DxCP2vAWJ6ZsSVnJTXretG/Q1Hciyc5nIudabGm:5j/NDB9m2v9JqVJ7OG/Q18irfdabGm

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks