General

  • Target

    9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe

  • Size

    783KB

  • Sample

    250208-cfc98szpdm

  • MD5

    3b1535c8901387dfb2f75e34dfec94c7

  • SHA1

    abb6f0f4aa913f150113cf9bc6740645b3464141

  • SHA256

    9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8

  • SHA512

    7fe2e9bc98bca0e76c3c68ae77b6300870ff6509a0ae5b1732e253aae9e529ff72778cbcdc92826453797bf7b5d0c4c0a74dc5f2e7e82bcd005ffd8aa5ff54c1

  • SSDEEP

    12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKh:m+OQbpbgsFdAyQvzSqaq8qI

Malware Config

Targets

    • Target

      9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8.exe

    • Size

      783KB

    • MD5

      3b1535c8901387dfb2f75e34dfec94c7

    • SHA1

      abb6f0f4aa913f150113cf9bc6740645b3464141

    • SHA256

      9f428b9726cb683d247d51ef8113af549223ec6257a07ccd7654361e262b5fa8

    • SHA512

      7fe2e9bc98bca0e76c3c68ae77b6300870ff6509a0ae5b1732e253aae9e529ff72778cbcdc92826453797bf7b5d0c4c0a74dc5f2e7e82bcd005ffd8aa5ff54c1

    • SSDEEP

      12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqKh:m+OQbpbgsFdAyQvzSqaq8qI

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks