General

  • Target

    ec0a87ee5b90c3e832df1783ad84ce815699b9650af24d879012ed5a5d72459a

  • Size

    783KB

  • Sample

    250124-mfrsqstmhw

  • MD5

    2b92024fad384b0fcc4e1934dd6a1fcf

  • SHA1

    9adc4985037273d3734f78c53959cedf5d798de1

  • SHA256

    ec0a87ee5b90c3e832df1783ad84ce815699b9650af24d879012ed5a5d72459a

  • SHA512

    a6b155f4198cccbff59c73f013359550007f38ff8b71bd58a7480870212559fe8af06f63418083d01deba390dacc5b5126fe1549642ceda4ea46d7d754f41503

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Targets

    • Target

      ec0a87ee5b90c3e832df1783ad84ce815699b9650af24d879012ed5a5d72459a

    • Size

      783KB

    • MD5

      2b92024fad384b0fcc4e1934dd6a1fcf

    • SHA1

      9adc4985037273d3734f78c53959cedf5d798de1

    • SHA256

      ec0a87ee5b90c3e832df1783ad84ce815699b9650af24d879012ed5a5d72459a

    • SHA512

      a6b155f4198cccbff59c73f013359550007f38ff8b71bd58a7480870212559fe8af06f63418083d01deba390dacc5b5126fe1549642ceda4ea46d7d754f41503

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks