General

  • Target

    DCRatBuild.exe

  • Size

    1.2MB

  • Sample

    250116-t8c9dayrat

  • MD5

    1c4d40bb27938ee8ccbe1b09a8a76ba6

  • SHA1

    dc2266dc5b7b265221c7c9315267067c8fe76d92

  • SHA256

    ee930b7c7d01783de8fb24c9f40924a4e9da49033951a450c63d046f2a2ce3ee

  • SHA512

    7cb63784b5eeaf73941c2f425d3bcdea4200510929f2e9ba4ff4e6c3983e61fc4514d3a66a5405b8b1c052d07a8cd9784693a4ed26a0656c7d6b7b80121d1daa

  • SSDEEP

    24576:GTbBv5rU8/38TnIPZKN9OJMA+53iE0n3g6s:4BtMTnIPkNomA+53KO

Malware Config

Targets

    • Target

      DCRatBuild.exe

    • Size

      1.2MB

    • MD5

      1c4d40bb27938ee8ccbe1b09a8a76ba6

    • SHA1

      dc2266dc5b7b265221c7c9315267067c8fe76d92

    • SHA256

      ee930b7c7d01783de8fb24c9f40924a4e9da49033951a450c63d046f2a2ce3ee

    • SHA512

      7cb63784b5eeaf73941c2f425d3bcdea4200510929f2e9ba4ff4e6c3983e61fc4514d3a66a5405b8b1c052d07a8cd9784693a4ed26a0656c7d6b7b80121d1daa

    • SSDEEP

      24576:GTbBv5rU8/38TnIPZKN9OJMA+53iE0n3g6s:4BtMTnIPkNomA+53KO

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.