General

  • Target

    b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13.exe

  • Size

    1.7MB

  • Sample

    250122-c6ntnavkbn

  • MD5

    62b108ad83c4b340fe2bcad3cdaca141

  • SHA1

    ddf933ec41d253e8ead1ce923762f8fcdf36cc2d

  • SHA256

    b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13

  • SHA512

    1ed101896adcd32440e79b2bb425e9a5a9753c3bf6c6d11ef19b2525a93ae1316ecb779b2a6250318f34c3872d3c4de7e522050dda9516afc0f8e96d554cf76c

  • SSDEEP

    49152:D+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvt:uTHUxUoh1IF9gl20

Malware Config

Targets

    • Target

      b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13.exe

    • Size

      1.7MB

    • MD5

      62b108ad83c4b340fe2bcad3cdaca141

    • SHA1

      ddf933ec41d253e8ead1ce923762f8fcdf36cc2d

    • SHA256

      b1ed8df7e68c8e614b3dc1b91fde36e41d5564b9404c2e36f9d7b756790f2f13

    • SHA512

      1ed101896adcd32440e79b2bb425e9a5a9753c3bf6c6d11ef19b2525a93ae1316ecb779b2a6250318f34c3872d3c4de7e522050dda9516afc0f8e96d554cf76c

    • SSDEEP

      49152:D+gYXZTD1VXUqzX7VwjvMoh1IFyuyigWnMzm6sDBKvt:uTHUxUoh1IF9gl20

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks