General

  • Target

    a09c7f65b8c6559808fe7e429078639a61816e5c76e08466dfb5c03b04f27a18.exe

  • Size

    1.1MB

  • Sample

    250123-ej17kssmak

  • MD5

    9e7c6c00ffd9d6501586ff6e3a87ff47

  • SHA1

    da1f6be302efc67fb981d2cac011caa3ca40df93

  • SHA256

    a09c7f65b8c6559808fe7e429078639a61816e5c76e08466dfb5c03b04f27a18

  • SHA512

    6355e8ac75f8da391be58737e8f2f56a99dfbfb757d5044119d0c6e67954656ce7d3da65790b46c67ed4744154810874ed9e1964d3eb68a4420ac81072cdd5e0

  • SSDEEP

    24576:u2G/nvxW3WieC+TmsHesd2RxXEh2NnJ40Vm:ubA3j+TmsMQgFS

Malware Config

Targets

    • Target

      a09c7f65b8c6559808fe7e429078639a61816e5c76e08466dfb5c03b04f27a18.exe

    • Size

      1.1MB

    • MD5

      9e7c6c00ffd9d6501586ff6e3a87ff47

    • SHA1

      da1f6be302efc67fb981d2cac011caa3ca40df93

    • SHA256

      a09c7f65b8c6559808fe7e429078639a61816e5c76e08466dfb5c03b04f27a18

    • SHA512

      6355e8ac75f8da391be58737e8f2f56a99dfbfb757d5044119d0c6e67954656ce7d3da65790b46c67ed4744154810874ed9e1964d3eb68a4420ac81072cdd5e0

    • SSDEEP

      24576:u2G/nvxW3WieC+TmsHesd2RxXEh2NnJ40Vm:ubA3j+TmsMQgFS

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks