General

  • Target

    6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe

  • Size

    2.7MB

  • Sample

    250125-ewakdsxkam

  • MD5

    730fee3e3541f5fbf39bad2dc667ea70

  • SHA1

    0171c24593ec0a6bcf7905b8daeb232f5adc03cd

  • SHA256

    6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1

  • SHA512

    aa638822f7bb6d1ab7debc5816c4dac21885716a159777a91caec748f9a21746731596bc39378c6323d168ff2d55ac610e385caf34cf2ed50488a2db2408c89c

  • SSDEEP

    49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctEC:7bwsgql9hJfUgX8+vc6

Malware Config

Targets

    • Target

      6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1N.exe

    • Size

      2.7MB

    • MD5

      730fee3e3541f5fbf39bad2dc667ea70

    • SHA1

      0171c24593ec0a6bcf7905b8daeb232f5adc03cd

    • SHA256

      6f1b10a1c174cb19fe8f439044e6f447a22f357878f8b65d3e0593aab67672d1

    • SHA512

      aa638822f7bb6d1ab7debc5816c4dac21885716a159777a91caec748f9a21746731596bc39378c6323d168ff2d55ac610e385caf34cf2ed50488a2db2408c89c

    • SSDEEP

      49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctEC:7bwsgql9hJfUgX8+vc6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks