General

  • Target

    ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e.exe

  • Size

    1.7MB

  • Sample

    250116-jlkpts1kbj

  • MD5

    60b616116be77dbf109954260772aa40

  • SHA1

    3d6df410f548e1936313e1835d0b2f893f827689

  • SHA256

    ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e

  • SHA512

    89efc0c5f3279870127d2c847aa1dc02d29d0e4d3ae1f31c02ff5ae4c556a04ed57abda424f6fa04c3c2b3cf889bf08d7df53858f5bccf16b433d3c530c37363

  • SSDEEP

    24576:j3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJN:jgwuuEpdDLNwVMeXDL0fdSzAGM

Malware Config

Targets

    • Target

      ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e.exe

    • Size

      1.7MB

    • MD5

      60b616116be77dbf109954260772aa40

    • SHA1

      3d6df410f548e1936313e1835d0b2f893f827689

    • SHA256

      ec28f3527cbf73f5d284739eb21c9dccb40c432e377b17b550c67ce377bdf06e

    • SHA512

      89efc0c5f3279870127d2c847aa1dc02d29d0e4d3ae1f31c02ff5ae4c556a04ed57abda424f6fa04c3c2b3cf889bf08d7df53858f5bccf16b433d3c530c37363

    • SSDEEP

      24576:j3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJN:jgwuuEpdDLNwVMeXDL0fdSzAGM

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks