General

  • Target

    swift.rar

  • Size

    1.5MB

  • Sample

    250124-k536yssldm

  • MD5

    dc8866f626aae39102d5a0dce1b3695b

  • SHA1

    37ab0eb8b17d327d47ebfa729dd52d4f409ecbf9

  • SHA256

    5a4bcc6593834b5aa0fd5ef8f9a755b78ba98492249c66dddfc2e77f1cdb0ce2

  • SHA512

    08df2db96955f719eb50e75c45e97d30e073011efa05db9d6220a8a16e283ef17efb2eb2bdaf22878d3c96e20ac00d10a8c729ec98c420bbbcee498cf15efcab

  • SSDEEP

    24576:tvHXV3VDGkfPggkNC2c2QNFvkLPQOA92+aBO6drLPMFdzXf8nU9aLSbQPZzARHJ6:1XVFBL2KFcLPJU2+idBLaDlqlPN2XcV

Malware Config

Targets

    • Target

      swift.rar

    • Size

      1.5MB

    • MD5

      dc8866f626aae39102d5a0dce1b3695b

    • SHA1

      37ab0eb8b17d327d47ebfa729dd52d4f409ecbf9

    • SHA256

      5a4bcc6593834b5aa0fd5ef8f9a755b78ba98492249c66dddfc2e77f1cdb0ce2

    • SHA512

      08df2db96955f719eb50e75c45e97d30e073011efa05db9d6220a8a16e283ef17efb2eb2bdaf22878d3c96e20ac00d10a8c729ec98c420bbbcee498cf15efcab

    • SSDEEP

      24576:tvHXV3VDGkfPggkNC2c2QNFvkLPQOA92+aBO6drLPMFdzXf8nU9aLSbQPZzARHJ6:1XVFBL2KFcLPJU2+idBLaDlqlPN2XcV

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks