General

  • Target

    57feb30bfa52e12db717f765271f337c2fb9b9f1799b7c6a6c2e9123c9d2b45a.exe

  • Size

    783KB

  • Sample

    250123-h5zsesynh1

  • MD5

    678f3b5fe3ba32b044538facd3576d18

  • SHA1

    4f67bfe0d9caa57d28394158147a2abbb6d44a95

  • SHA256

    57feb30bfa52e12db717f765271f337c2fb9b9f1799b7c6a6c2e9123c9d2b45a

  • SHA512

    75a028a56d24e88e9dc21d7e35639225e6207f634797f33c3c9f31f7b39b76b16e5feca1fe0c7a4030e66e587a8e58487712be89add55818fbf9019c887d17e8

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKn:m+OQbpbgsFdAyQvzSqaq8qi

Malware Config

Targets

    • Target

      57feb30bfa52e12db717f765271f337c2fb9b9f1799b7c6a6c2e9123c9d2b45a.exe

    • Size

      783KB

    • MD5

      678f3b5fe3ba32b044538facd3576d18

    • SHA1

      4f67bfe0d9caa57d28394158147a2abbb6d44a95

    • SHA256

      57feb30bfa52e12db717f765271f337c2fb9b9f1799b7c6a6c2e9123c9d2b45a

    • SHA512

      75a028a56d24e88e9dc21d7e35639225e6207f634797f33c3c9f31f7b39b76b16e5feca1fe0c7a4030e66e587a8e58487712be89add55818fbf9019c887d17e8

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKn:m+OQbpbgsFdAyQvzSqaq8qi

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks