General

  • Target

    121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe

  • Size

    2.5MB

  • Sample

    250202-ej8xeswlbq

  • MD5

    fc27116ce1b57a71d7d201e9aae86b01

  • SHA1

    ff047b7c918d9ff388b5c4928bfad5dcc818f1d4

  • SHA256

    121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b

  • SHA512

    25747516de2d99e6193fc920435ececf1b7ddb8990487d26d03cf6179b7dab0f5172c0dfa5d4db4a29028c00c12a9fb266bc14d6920e864d6a3934af7748618b

  • SSDEEP

    49152:zx6mbB202bRTk7puPi9bOdL/+AmU0FwGkxKYFC19Jm/PKh:zUmbB20sRSuPi9bQL/+AmU0F7LS

Malware Config

Targets

    • Target

      121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b.exe

    • Size

      2.5MB

    • MD5

      fc27116ce1b57a71d7d201e9aae86b01

    • SHA1

      ff047b7c918d9ff388b5c4928bfad5dcc818f1d4

    • SHA256

      121d462ca9f33798e076d069ec6b84c5ae0573bbaac8df8dd78efbb7041bd30b

    • SHA512

      25747516de2d99e6193fc920435ececf1b7ddb8990487d26d03cf6179b7dab0f5172c0dfa5d4db4a29028c00c12a9fb266bc14d6920e864d6a3934af7748618b

    • SSDEEP

      49152:zx6mbB202bRTk7puPi9bOdL/+AmU0FwGkxKYFC19Jm/PKh:zUmbB20sRSuPi9bQL/+AmU0F7LS

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks