General

  • Target

    6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f.exe

  • Size

    2.7MB

  • Sample

    250118-e4v63atlhk

  • MD5

    9f7d0b9a32de0f6cefb6a3328f833034

  • SHA1

    b2f45dab2c76093c317cab36a47873e55e2c7c6e

  • SHA256

    6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f

  • SHA512

    0ead99e58a9d244f308405a1cff664479de57f1ee38014a557642ef1ea3fe52f20f433c17da565ea23168a8b8c416fcbcb43e6d3df0c959341d36f592fb97f1d

  • SSDEEP

    49152:bBu+dK3GaaTUukCTXO2s2f1sKfmFRd0MdOa5k1kpm/Ufn6sC:duyjAi+j2aK+F54/U/6s

Malware Config

Targets

    • Target

      6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f.exe

    • Size

      2.7MB

    • MD5

      9f7d0b9a32de0f6cefb6a3328f833034

    • SHA1

      b2f45dab2c76093c317cab36a47873e55e2c7c6e

    • SHA256

      6e333e5b68668934186d53525c24d2ed857c35e36b4d21102d06e52e6890ac5f

    • SHA512

      0ead99e58a9d244f308405a1cff664479de57f1ee38014a557642ef1ea3fe52f20f433c17da565ea23168a8b8c416fcbcb43e6d3df0c959341d36f592fb97f1d

    • SSDEEP

      49152:bBu+dK3GaaTUukCTXO2s2f1sKfmFRd0MdOa5k1kpm/Ufn6sC:duyjAi+j2aK+F54/U/6s

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks