General

  • Target

    26c6ef53b2879f9186b0d848992fd353adea2b66169eee692c14c8fde230bcc8N.exe

  • Size

    984KB

  • Sample

    250202-ad4y3awnfx

  • MD5

    b813c234f84296fc8c62e48152bf2d20

  • SHA1

    6448ce15c36cdd80c54a3921a0250c7d4567b343

  • SHA256

    26c6ef53b2879f9186b0d848992fd353adea2b66169eee692c14c8fde230bcc8

  • SHA512

    1b7a317447a1ad86db00d29e9a247555e8cf748369ba35851001fd04501bb01bac69ad6474ed219e530822be7544849b087aa3102cd6d96e9c1cb2f3606b24cc

  • SSDEEP

    12288:MyEIOYTNEIf5AycvEhKIV6tEcln0Ai2a61h3cQ9Fk+ntGoWuzsx1oiLgo:MyErYT+PvXIUln/1GJgo

Malware Config

Targets

    • Target

      26c6ef53b2879f9186b0d848992fd353adea2b66169eee692c14c8fde230bcc8N.exe

    • Size

      984KB

    • MD5

      b813c234f84296fc8c62e48152bf2d20

    • SHA1

      6448ce15c36cdd80c54a3921a0250c7d4567b343

    • SHA256

      26c6ef53b2879f9186b0d848992fd353adea2b66169eee692c14c8fde230bcc8

    • SHA512

      1b7a317447a1ad86db00d29e9a247555e8cf748369ba35851001fd04501bb01bac69ad6474ed219e530822be7544849b087aa3102cd6d96e9c1cb2f3606b24cc

    • SSDEEP

      12288:MyEIOYTNEIf5AycvEhKIV6tEcln0Ai2a61h3cQ9Fk+ntGoWuzsx1oiLgo:MyErYT+PvXIUln/1GJgo

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks