General

  • Target

    591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de

  • Size

    2.2MB

  • Sample

    250202-3bmafs1qhy

  • MD5

    86f0b098d34e7964a9da4131d1d58fa9

  • SHA1

    614cbbda0058cefe56cf2e9c0db2e06f95a195a5

  • SHA256

    591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de

  • SHA512

    ca8bb85f6c5cf9766806965d00d9ceaaa490fc93c88fa70de27542cd5520c428a48e9a91c912940858e4c3948f4bc362ce98c76a2e24099341c88f9e3a2289a3

  • SSDEEP

    24576:tg/TM3unSV8JHYj0M14oMKhqN8+r/tse9WPJXelRWjq+jPx8FT2t6nTtHtO3g4Jc:mQenScjKkr/y+qXeliq+iT2t60g7Er3

Malware Config

Targets

    • Target

      591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de

    • Size

      2.2MB

    • MD5

      86f0b098d34e7964a9da4131d1d58fa9

    • SHA1

      614cbbda0058cefe56cf2e9c0db2e06f95a195a5

    • SHA256

      591f9eba78261505ce83e1b6fca9388e8c932d604b1b376a21ee7c99182665de

    • SHA512

      ca8bb85f6c5cf9766806965d00d9ceaaa490fc93c88fa70de27542cd5520c428a48e9a91c912940858e4c3948f4bc362ce98c76a2e24099341c88f9e3a2289a3

    • SSDEEP

      24576:tg/TM3unSV8JHYj0M14oMKhqN8+r/tse9WPJXelRWjq+jPx8FT2t6nTtHtO3g4Jc:mQenScjKkr/y+qXeliq+iT2t60g7Er3

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks