Resubmissions

02-02-2025 06:58

250202-hrxqxasncn 10

02-02-2025 06:26

250202-g7j93szkbt 10

General

  • Target

    DCRatBuild.bat

  • Size

    2.2MB

  • Sample

    250202-hrxqxasncn

  • MD5

    f961009433ca2f3a302b6a7236bc7ef4

  • SHA1

    de9c950643db1fd43fd37d1f01db5d186a492244

  • SHA256

    b4b47571926c6fb637d7ca1f9ce6e171ab98f8d63f9efb89954ca9aa10c8260b

  • SHA512

    3637e15257a813ed87ad05ebc4fc28550c8440afe06e07205309c69f615e03f0cc7e318357fabe7951c729c56d079e188aad4b10e1e4feabf010e11e729875a1

  • SSDEEP

    49152:UbA30EQtOTsSj5tM1xb5fO7jR1SaZRX62:UbFCBjHgx1fsjR1ne2

Malware Config

Targets

    • Target

      DCRatBuild.bat

    • Size

      2.2MB

    • MD5

      f961009433ca2f3a302b6a7236bc7ef4

    • SHA1

      de9c950643db1fd43fd37d1f01db5d186a492244

    • SHA256

      b4b47571926c6fb637d7ca1f9ce6e171ab98f8d63f9efb89954ca9aa10c8260b

    • SHA512

      3637e15257a813ed87ad05ebc4fc28550c8440afe06e07205309c69f615e03f0cc7e318357fabe7951c729c56d079e188aad4b10e1e4feabf010e11e729875a1

    • SSDEEP

      49152:UbA30EQtOTsSj5tM1xb5fO7jR1SaZRX62:UbFCBjHgx1fsjR1ne2

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks