General

  • Target

    a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48

  • Size

    783KB

  • Sample

    250128-b7w1zssrcs

  • MD5

    3b3c2d80c5a454a147432307689450cd

  • SHA1

    6ae70ec700709b860d6c9a501f953e98b2b614e5

  • SHA256

    a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48

  • SHA512

    e1f626becf40260dc90559383e95eff8f8d4d2a447a41118b01a6a02002d98d0be2389f4c9030dbc3f4f8bab1d1ec4dc5daa31755b55c6d09d0c6f3f054443a0

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

Malware Config

Targets

    • Target

      a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48

    • Size

      783KB

    • MD5

      3b3c2d80c5a454a147432307689450cd

    • SHA1

      6ae70ec700709b860d6c9a501f953e98b2b614e5

    • SHA256

      a86128295c56770cca66fc90ae4b45ee074c7748f0a61e76cecb50975d0a5d48

    • SHA512

      e1f626becf40260dc90559383e95eff8f8d4d2a447a41118b01a6a02002d98d0be2389f4c9030dbc3f4f8bab1d1ec4dc5daa31755b55c6d09d0c6f3f054443a0

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks