General

  • Target

    a08c1dbff924e8ae6d84449d5e354fa1d0bb729a4a265515bce03f09edb68e3cN.exe

  • Size

    783KB

  • Sample

    250122-epmalsyjap

  • MD5

    fe3d6c88424163b80a62962709b16250

  • SHA1

    e0c49ed67f31bfbae1269c112026a548fa4c023c

  • SHA256

    a08c1dbff924e8ae6d84449d5e354fa1d0bb729a4a265515bce03f09edb68e3c

  • SHA512

    d2225dc3bb4574bd891a9aef820d43e24d4b5c3c368855bc0edc834ce6b45473cbdcc70ac92189cbcc1bbaa680637a47182db14cb235ae2cbfbf7919ab5f0a13

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Targets

    • Target

      a08c1dbff924e8ae6d84449d5e354fa1d0bb729a4a265515bce03f09edb68e3cN.exe

    • Size

      783KB

    • MD5

      fe3d6c88424163b80a62962709b16250

    • SHA1

      e0c49ed67f31bfbae1269c112026a548fa4c023c

    • SHA256

      a08c1dbff924e8ae6d84449d5e354fa1d0bb729a4a265515bce03f09edb68e3c

    • SHA512

      d2225dc3bb4574bd891a9aef820d43e24d4b5c3c368855bc0edc834ce6b45473cbdcc70ac92189cbcc1bbaa680637a47182db14cb235ae2cbfbf7919ab5f0a13

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks