General

  • Target

    647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe

  • Size

    2.7MB

  • Sample

    250130-dpslysxjgy

  • MD5

    a079d0ef7608f8fb08e6e67ebe720cdd

  • SHA1

    612e4d36e0c92c850848ff92dc466fb2c956415b

  • SHA256

    647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274

  • SHA512

    d2d4aa554c4bc1108dc73ee97dcb17fb66fdb862d64b10c08456fe62be5ff9d9e7b83a76956dbc2ffd855fb3a675d6939ee4416c4ebf2c55f060f7d0db93eb88

  • SSDEEP

    49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctECb:7bwsgql9hJfUgX8+vc6i

Malware Config

Targets

    • Target

      647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274.exe

    • Size

      2.7MB

    • MD5

      a079d0ef7608f8fb08e6e67ebe720cdd

    • SHA1

      612e4d36e0c92c850848ff92dc466fb2c956415b

    • SHA256

      647194fc5716bcdebe9b20e13b3f08e7816d13530a15e8d1669f2f25ba628274

    • SHA512

      d2d4aa554c4bc1108dc73ee97dcb17fb66fdb862d64b10c08456fe62be5ff9d9e7b83a76956dbc2ffd855fb3a675d6939ee4416c4ebf2c55f060f7d0db93eb88

    • SSDEEP

      49152:7bA3jfxSks5WqWk9IEJKb9aUgXXNOUnkonLxB5ctECb:7bwsgql9hJfUgX8+vc6i

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks