General

  • Target

    iiu21398e8ydsa.exe

  • Size

    1.7MB

  • Sample

    250201-rwwtvayjhk

  • MD5

    402413f48045d5217eb19c3ca703b3b9

  • SHA1

    bcb9c54c86f677958d5acbd5d4cd5eb6de639340

  • SHA256

    19b45d7e3ede011ff54ba5dc54705a38f030bfc70afc6dec3a5931f3f8d01a75

  • SHA512

    c4fde3b1fbe2a98fa118f052cc668a6c5321cf8855d33e4b709c082ce086e6fd0e62872be056d8e3a4b73e0f7357e455cc3e7e053885e1404084b3628fda3811

  • SSDEEP

    24576:U2G/nvxW3Ww0t60jeAbFDuiYq2hszeo9/gqHriQcU4bobxAgedn6CrRNe2ONaPx7:UbA3060jSReaNqLz4bifed6ERNFXx7

Malware Config

Targets

    • Target

      iiu21398e8ydsa.exe

    • Size

      1.7MB

    • MD5

      402413f48045d5217eb19c3ca703b3b9

    • SHA1

      bcb9c54c86f677958d5acbd5d4cd5eb6de639340

    • SHA256

      19b45d7e3ede011ff54ba5dc54705a38f030bfc70afc6dec3a5931f3f8d01a75

    • SHA512

      c4fde3b1fbe2a98fa118f052cc668a6c5321cf8855d33e4b709c082ce086e6fd0e62872be056d8e3a4b73e0f7357e455cc3e7e053885e1404084b3628fda3811

    • SSDEEP

      24576:U2G/nvxW3Ww0t60jeAbFDuiYq2hszeo9/gqHriQcU4bobxAgedn6CrRNe2ONaPx7:UbA3060jSReaNqLz4bifed6ERNFXx7

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks