General

  • Target

    4735bb00bcb92c0c5d85599e289925ef.exe

  • Size

    3.2MB

  • Sample

    250208-yavszszmft

  • MD5

    4735bb00bcb92c0c5d85599e289925ef

  • SHA1

    90dee1ecc8721777366e9c0d2d3c9fc2df6a925b

  • SHA256

    8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b

  • SHA512

    673a67e73f8d3a31403cee50234d3160afe3eda75f75935677f9da0e955e28e67d9265c1a23c80b0fab7bd1aaa85ece8e3bf1bf085e76d9cbbd498a34a77287e

  • SSDEEP

    98304:BjxkN1YiQ2DmsiJb0D2OG5Mbser0ZAY8pD1X0C:B161YitDZiJoZgAY8pDl0

Malware Config

Targets

    • Target

      4735bb00bcb92c0c5d85599e289925ef.exe

    • Size

      3.2MB

    • MD5

      4735bb00bcb92c0c5d85599e289925ef

    • SHA1

      90dee1ecc8721777366e9c0d2d3c9fc2df6a925b

    • SHA256

      8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b

    • SHA512

      673a67e73f8d3a31403cee50234d3160afe3eda75f75935677f9da0e955e28e67d9265c1a23c80b0fab7bd1aaa85ece8e3bf1bf085e76d9cbbd498a34a77287e

    • SSDEEP

      98304:BjxkN1YiQ2DmsiJb0D2OG5Mbser0ZAY8pD1X0C:B161YitDZiJoZgAY8pDl0

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks