General

  • Target

    edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322.exe

  • Size

    1.7MB

  • Sample

    250121-b4csyazlbq

  • MD5

    70cce5da5f92bbe6d8cb1d38b7071a61

  • SHA1

    3aa3958772bec55307a2181982f063415278e761

  • SHA256

    edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322

  • SHA512

    959b63af4e19cafa2be83a63eda2bf8192c779a70772372b42e1954786d292b2991278e3221f29e25dd9ea4f88801d177e81a79340d8ed548453b51888cafaba

  • SSDEEP

    24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJK:tgwuuEpdDLNwVMeXDL0fdSzAGf

Malware Config

Targets

    • Target

      edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322.exe

    • Size

      1.7MB

    • MD5

      70cce5da5f92bbe6d8cb1d38b7071a61

    • SHA1

      3aa3958772bec55307a2181982f063415278e761

    • SHA256

      edb7c41437f94c8941985169d46a079c70c10f0be1f58faf8751895541414322

    • SHA512

      959b63af4e19cafa2be83a63eda2bf8192c779a70772372b42e1954786d292b2991278e3221f29e25dd9ea4f88801d177e81a79340d8ed548453b51888cafaba

    • SSDEEP

      24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJK:tgwuuEpdDLNwVMeXDL0fdSzAGf

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks