General

  • Target

    29329d17b110755ec3a04e157abb845c.exe

  • Size

    2.2MB

  • Sample

    250128-rk4qba1lhw

  • MD5

    29329d17b110755ec3a04e157abb845c

  • SHA1

    756fd244223a93ce2778fd7fb5558d9861328d01

  • SHA256

    f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393

  • SHA512

    89c29661d31fad68c9eb6a96a105c32c0c5e620cafc7e028031dd6b5ea4a0693e5d200ec8afab2989a169f6530764ad1427d431e8d0864bb0dec63e302b8f06f

  • SSDEEP

    24576:z2G/nvxW3WieCaKuZ3X4NGX254GP/gG22G/nvxW3WieCaKuZ3X4NGX254GP/gG3:zbA3jdKGMbA3jdKG5

Malware Config

Targets

    • Target

      29329d17b110755ec3a04e157abb845c.exe

    • Size

      2.2MB

    • MD5

      29329d17b110755ec3a04e157abb845c

    • SHA1

      756fd244223a93ce2778fd7fb5558d9861328d01

    • SHA256

      f14e979398839caddd543261a8e9773bcd5a95d9f433e113ecdc8605cd3b2393

    • SHA512

      89c29661d31fad68c9eb6a96a105c32c0c5e620cafc7e028031dd6b5ea4a0693e5d200ec8afab2989a169f6530764ad1427d431e8d0864bb0dec63e302b8f06f

    • SSDEEP

      24576:z2G/nvxW3WieCaKuZ3X4NGX254GP/gG22G/nvxW3WieCaKuZ3X4NGX254GP/gG3:zbA3jdKGMbA3jdKG5

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks