General

  • Target

    2b18b40a90808621be15138e6a5ab8dd849c62d5cc9bb43def5598a2ef578be5

  • Size

    1.7MB

  • Sample

    250121-2bm2bavker

  • MD5

    6edab7625800c81a8eb6ef36c2fb54fe

  • SHA1

    28fe7ca7e96ccd496bb474ce9be0c7a828a92fed

  • SHA256

    2b18b40a90808621be15138e6a5ab8dd849c62d5cc9bb43def5598a2ef578be5

  • SHA512

    2de808f6acfa8fd5d734db89d75668bab1187ab68d62a432d86fe8b4a1fb6de5422c4374cb8c0a2b894c1f8fb9fa514a3238e93123486c1254075178c67cba71

  • SSDEEP

    49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:OTHUxUoh1IF9gl2

Malware Config

Targets

    • Target

      2b18b40a90808621be15138e6a5ab8dd849c62d5cc9bb43def5598a2ef578be5

    • Size

      1.7MB

    • MD5

      6edab7625800c81a8eb6ef36c2fb54fe

    • SHA1

      28fe7ca7e96ccd496bb474ce9be0c7a828a92fed

    • SHA256

      2b18b40a90808621be15138e6a5ab8dd849c62d5cc9bb43def5598a2ef578be5

    • SHA512

      2de808f6acfa8fd5d734db89d75668bab1187ab68d62a432d86fe8b4a1fb6de5422c4374cb8c0a2b894c1f8fb9fa514a3238e93123486c1254075178c67cba71

    • SSDEEP

      49152:j+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKv:OTHUxUoh1IF9gl2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks