General

  • Target

    DCRatBuild.exe

  • Size

    1.3MB

  • Sample

    250119-sxyv9strgq

  • MD5

    7dac76fcfd7f87fd4df2f890d7136046

  • SHA1

    7c835d1de4334e1e3a552f4f68d792b668c5e865

  • SHA256

    1683412372883414e362d6513e7329a7177b0cc7ddb3fb46375ac023f51379e5

  • SHA512

    58e159d8a34a5536fb9893af6dfbbbc544a21dd5b7b520094961be93b2a7684f0696cff7fa14918dff115af2e52fbc1c70cd4c73f026657cd5060458a7a70ce1

  • SSDEEP

    24576:U2G/nvxW3Ww0tY6jb/ozlw21m0MTGFR4cx6SRrFBZDiFNwHJItght:UbA30SlwqeGDFrrZbJF

Malware Config

Targets

    • Target

      DCRatBuild.exe

    • Size

      1.3MB

    • MD5

      7dac76fcfd7f87fd4df2f890d7136046

    • SHA1

      7c835d1de4334e1e3a552f4f68d792b668c5e865

    • SHA256

      1683412372883414e362d6513e7329a7177b0cc7ddb3fb46375ac023f51379e5

    • SHA512

      58e159d8a34a5536fb9893af6dfbbbc544a21dd5b7b520094961be93b2a7684f0696cff7fa14918dff115af2e52fbc1c70cd4c73f026657cd5060458a7a70ce1

    • SSDEEP

      24576:U2G/nvxW3Ww0tY6jb/ozlw21m0MTGFR4cx6SRrFBZDiFNwHJItght:UbA30SlwqeGDFrrZbJF

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks