General

  • Target

    8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b.exe

  • Size

    1.2MB

  • Sample

    250202-gpftyazram

  • MD5

    ed2798838993e4cbcbf8115cdbbc31fa

  • SHA1

    b013a3df59ec1a6407c7d290798ddd370cb6a645

  • SHA256

    8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b

  • SHA512

    4020e60ff02fb5f2beacf7d7c595cd3927a6b6c2f9f57181bc565a59f8a4b4f457db5287aa8b32cffbb2da0f6d4a1d7fe1dec443c28e370189f4f5bf0d4b3fae

  • SSDEEP

    24576:O2G/nvxW3WY3h0KomE5c7JtTE/TWsO8Mxz:ObA3x3GKCuP3AM5

Malware Config

Targets

    • Target

      8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b.exe

    • Size

      1.2MB

    • MD5

      ed2798838993e4cbcbf8115cdbbc31fa

    • SHA1

      b013a3df59ec1a6407c7d290798ddd370cb6a645

    • SHA256

      8fa48ae55b5ba85e84d086d7e94a87095d20582e091eaf96ebe7cf906216510b

    • SHA512

      4020e60ff02fb5f2beacf7d7c595cd3927a6b6c2f9f57181bc565a59f8a4b4f457db5287aa8b32cffbb2da0f6d4a1d7fe1dec443c28e370189f4f5bf0d4b3fae

    • SSDEEP

      24576:O2G/nvxW3WY3h0KomE5c7JtTE/TWsO8Mxz:ObA3x3GKCuP3AM5

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks