General

  • Target

    97a5e51d92d54fc68b2bd391d168738a1c20aa86a265e6bdecbd00c30f57366dN.exe

  • Size

    1.7MB

  • Sample

    250117-j377fsypbm

  • MD5

    ef0eaa6480733054309ffbbd02f057d0

  • SHA1

    43d3b54ecc3ad577e887b3ce30a94e7ed65d7281

  • SHA256

    97a5e51d92d54fc68b2bd391d168738a1c20aa86a265e6bdecbd00c30f57366d

  • SHA512

    7e8c601bfcd6f37989e7ff196c83d1657c6f63d5a4cdc788035955c7f2d0d4e21ce93305245d9ba9d852dd9b436cbe16b39c79ce7a2546914f961a12f54fdd9f

  • SSDEEP

    24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG

Malware Config

Targets

    • Target

      97a5e51d92d54fc68b2bd391d168738a1c20aa86a265e6bdecbd00c30f57366dN.exe

    • Size

      1.7MB

    • MD5

      ef0eaa6480733054309ffbbd02f057d0

    • SHA1

      43d3b54ecc3ad577e887b3ce30a94e7ed65d7281

    • SHA256

      97a5e51d92d54fc68b2bd391d168738a1c20aa86a265e6bdecbd00c30f57366d

    • SHA512

      7e8c601bfcd6f37989e7ff196c83d1657c6f63d5a4cdc788035955c7f2d0d4e21ce93305245d9ba9d852dd9b436cbe16b39c79ce7a2546914f961a12f54fdd9f

    • SSDEEP

      24576:N3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:NgwuuEpdDLNwVMeXDL0fdSzAG

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks