Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    DCRatBuild.exe

  • Size

    1.1MB

  • Sample

    250119-sv8mpatraq

  • MD5

    433957955e25e3447ea7d58b14c98081

  • SHA1

    3d2193fcf27254da6cfdfaa2047c0d4387a8bcd7

  • SHA256

    e3c7b91e5c1e89e14f7136e33bd51e6db13bc96e43c5217b63d023efd481cadb

  • SHA512

    684cba8504986b1c052317f18f39b297d979f1ac3b1fd128475aa3dcdf8f03f6be4f1f135a8bb3e8dc923e7fbe026c0c88ce037129639c6effdbd3894727c6aa

  • SSDEEP

    24576:U2G/nvxW3Ww0t7TXzCWUv88F59f1bONZR:UbA307CWV8D9t87

Malware Config

Targets

    • Target

      DCRatBuild.exe

    • Size

      1.1MB

    • MD5

      433957955e25e3447ea7d58b14c98081

    • SHA1

      3d2193fcf27254da6cfdfaa2047c0d4387a8bcd7

    • SHA256

      e3c7b91e5c1e89e14f7136e33bd51e6db13bc96e43c5217b63d023efd481cadb

    • SHA512

      684cba8504986b1c052317f18f39b297d979f1ac3b1fd128475aa3dcdf8f03f6be4f1f135a8bb3e8dc923e7fbe026c0c88ce037129639c6effdbd3894727c6aa

    • SSDEEP

      24576:U2G/nvxW3Ww0t7TXzCWUv88F59f1bONZR:UbA307CWV8D9t87

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks