General

  • Target

    d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe

  • Size

    2.7MB

  • Sample

    250121-lqarjaxqdq

  • MD5

    133f58a8a158d4d0edb84f287c27127f

  • SHA1

    2af95a4364675e01e0d688639bd8a19cf8f12dea

  • SHA256

    d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0

  • SHA512

    c0c6ffe1f272d68231ef9244f77b15645d16ed20b8fbd7706e11339240ba25943f70d7b69150b75abc6b0089e86a77a0800cbc99fda2db5d8500b4b9ccfaa247

  • SSDEEP

    49152:sqyJUSQelMhlk1w19BlUobhENGZXxRWi0UAuqYqqncK:pyJlQgGk1wPko1oO30UA7Yqqr

Malware Config

Targets

    • Target

      d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0.exe

    • Size

      2.7MB

    • MD5

      133f58a8a158d4d0edb84f287c27127f

    • SHA1

      2af95a4364675e01e0d688639bd8a19cf8f12dea

    • SHA256

      d1e12b5118382ed3e03fc92838410942d862e6fe2f4710c541210720b0bdf0a0

    • SHA512

      c0c6ffe1f272d68231ef9244f77b15645d16ed20b8fbd7706e11339240ba25943f70d7b69150b75abc6b0089e86a77a0800cbc99fda2db5d8500b4b9ccfaa247

    • SSDEEP

      49152:sqyJUSQelMhlk1w19BlUobhENGZXxRWi0UAuqYqqncK:pyJlQgGk1wPko1oO30UA7Yqqr

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks