General

  • Target

    5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617.exe

  • Size

    1.7MB

  • Sample

    250120-fyqj3asrbv

  • MD5

    53c51f410e619914de7f9dda8c18da66

  • SHA1

    5da42c476ccf634dc842e68c6af360f0831e472a

  • SHA256

    5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617

  • SHA512

    3a93a35a781a17dcd45dd74b79cb52c0bc15d9320ac44c47d1e1a97e644aa4bb1f9977b32d8de6a070bd8753646b1889f04f9a5b95fc6829be1b6c43247beb1c

  • SSDEEP

    24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJg:tgwuuEpdDLNwVMeXDL0fdSzAGD

Malware Config

Targets

    • Target

      5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617.exe

    • Size

      1.7MB

    • MD5

      53c51f410e619914de7f9dda8c18da66

    • SHA1

      5da42c476ccf634dc842e68c6af360f0831e472a

    • SHA256

      5a0a10f6b1fdbfa50ad78bc71702a21275cedc7c7da7171e4ca86b01314e0617

    • SHA512

      3a93a35a781a17dcd45dd74b79cb52c0bc15d9320ac44c47d1e1a97e644aa4bb1f9977b32d8de6a070bd8753646b1889f04f9a5b95fc6829be1b6c43247beb1c

    • SSDEEP

      24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJg:tgwuuEpdDLNwVMeXDL0fdSzAGD

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks