General

  • Target

    40ff13f7d3616f322000142cda7b432b45ea18df020c0dcfc1455202d67ad0ad.exe

  • Size

    783KB

  • Sample

    250123-b23atawkas

  • MD5

    284f614242b459699b4f93b34bcea38a

  • SHA1

    496d71d236c11b794dd355f3e76614c839971d42

  • SHA256

    40ff13f7d3616f322000142cda7b432b45ea18df020c0dcfc1455202d67ad0ad

  • SHA512

    398d9ade2bc0a108906784b85160396feed4a80586ac47d70db1079f7dfbdb728debf687164d36db9014a2c2cf1f47be33faa6c33644a3c44ec6f05c4ead74df

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKt:m+OQbpbgsFdAyQvzSqaq8q8

Malware Config

Targets

    • Target

      40ff13f7d3616f322000142cda7b432b45ea18df020c0dcfc1455202d67ad0ad.exe

    • Size

      783KB

    • MD5

      284f614242b459699b4f93b34bcea38a

    • SHA1

      496d71d236c11b794dd355f3e76614c839971d42

    • SHA256

      40ff13f7d3616f322000142cda7b432b45ea18df020c0dcfc1455202d67ad0ad

    • SHA512

      398d9ade2bc0a108906784b85160396feed4a80586ac47d70db1079f7dfbdb728debf687164d36db9014a2c2cf1f47be33faa6c33644a3c44ec6f05c4ead74df

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKt:m+OQbpbgsFdAyQvzSqaq8q8

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks