General

  • Target

    3dce7fce69c35c15988ad7bc647d4681.exe

  • Size

    2.7MB

  • Sample

    250202-tcv5bazrhp

  • MD5

    3dce7fce69c35c15988ad7bc647d4681

  • SHA1

    bf0b951d922c6e92e40cec56f641a0c48da49b57

  • SHA256

    534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb

  • SHA512

    99e11b00a61b901a0954dbdd6c1b533c2898662584ea296fd1a92b790ffe10690cf2acba4b595e9d517fc3088ec03450c1d1ee1ce9ae8cfe1a15f24ae14ad33e

  • SSDEEP

    49152:Ano0OKQIQaPECv3la9Bc0JpOkFl5B9LzYSbqtR6v:hMvlyG0JpOG50SbOg

Malware Config

Targets

    • Target

      3dce7fce69c35c15988ad7bc647d4681.exe

    • Size

      2.7MB

    • MD5

      3dce7fce69c35c15988ad7bc647d4681

    • SHA1

      bf0b951d922c6e92e40cec56f641a0c48da49b57

    • SHA256

      534190cdacfd4dd6d00505481ff5051320f6168e3740dafbc132a5003146c3bb

    • SHA512

      99e11b00a61b901a0954dbdd6c1b533c2898662584ea296fd1a92b790ffe10690cf2acba4b595e9d517fc3088ec03450c1d1ee1ce9ae8cfe1a15f24ae14ad33e

    • SSDEEP

      49152:Ano0OKQIQaPECv3la9Bc0JpOkFl5B9LzYSbqtR6v:hMvlyG0JpOG50SbOg

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks