General

  • Target

    0fa17a49135e93d8a45c9eca2033e45c3afcc748d452047daa90cfae57a30740N.exe

  • Size

    2.5MB

  • Sample

    250202-jns4zsslby

  • MD5

    7e12764a3dcdb61235625a662d5fb300

  • SHA1

    0e3047af2c786c489a49a9728ace7e5058f3e2f7

  • SHA256

    0fa17a49135e93d8a45c9eca2033e45c3afcc748d452047daa90cfae57a30740

  • SHA512

    f6be4e8e5028947c784a65e58dc1f124378b85869e153922849e7c0421ca6b140c496f83b14fd99ad85a793527d3d1a7170630f803a6d6c2baabe5e7fcef755b

  • SSDEEP

    49152:cTZXGGaXwpWG3wn8OTvgOP2Z4Ya+pHUvTzYUNBrQYn102K:AZXGGaXjGgJGHa+teTfQY10

Malware Config

Targets

    • Target

      0fa17a49135e93d8a45c9eca2033e45c3afcc748d452047daa90cfae57a30740N.exe

    • Size

      2.5MB

    • MD5

      7e12764a3dcdb61235625a662d5fb300

    • SHA1

      0e3047af2c786c489a49a9728ace7e5058f3e2f7

    • SHA256

      0fa17a49135e93d8a45c9eca2033e45c3afcc748d452047daa90cfae57a30740

    • SHA512

      f6be4e8e5028947c784a65e58dc1f124378b85869e153922849e7c0421ca6b140c496f83b14fd99ad85a793527d3d1a7170630f803a6d6c2baabe5e7fcef755b

    • SSDEEP

      49152:cTZXGGaXwpWG3wn8OTvgOP2Z4Ya+pHUvTzYUNBrQYn102K:AZXGGaXjGgJGHa+teTfQY10

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks