General

  • Target

    007c92b8ad2188efb216f2699a386238.exe

  • Size

    1.1MB

  • Sample

    250205-lnbk2s1jgv

  • MD5

    007c92b8ad2188efb216f2699a386238

  • SHA1

    c780a61bde93f59fa404ed217707f99e86f0c1fd

  • SHA256

    f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc

  • SHA512

    df65a0fb78ec1453921c8861f73d6dc8379797646d6aa66b7d20ea06bf7688fe4f009d720565c5075724a0da0d657b2bcdc5c4c0717e9ffcabf3d54123ce9e3b

  • SSDEEP

    24576:U2G/nvxW3Ww0tSUtIrZBMreAydD8FVgMjt2:UbA30SaIrfAUD8rM

Malware Config

Targets

    • Target

      007c92b8ad2188efb216f2699a386238.exe

    • Size

      1.1MB

    • MD5

      007c92b8ad2188efb216f2699a386238

    • SHA1

      c780a61bde93f59fa404ed217707f99e86f0c1fd

    • SHA256

      f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc

    • SHA512

      df65a0fb78ec1453921c8861f73d6dc8379797646d6aa66b7d20ea06bf7688fe4f009d720565c5075724a0da0d657b2bcdc5c4c0717e9ffcabf3d54123ce9e3b

    • SSDEEP

      24576:U2G/nvxW3Ww0tSUtIrZBMreAydD8FVgMjt2:UbA30SaIrfAUD8rM

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks