General

  • Target

    8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b.zip

  • Size

    2.8MB

  • Sample

    250208-yjr4fszrgx

  • MD5

    80ca7f35d773115c023ed9b097de78a0

  • SHA1

    aa60b7159003f7a9f7197abac44f5b583a727fd6

  • SHA256

    9f9dca1c5b7d1f8ce2a335d9117faff94bad38f2c071e102e12c514c98252ccf

  • SHA512

    6e6ba2b0937dd24ce5e51b7e216122cbc4965c502e9f773a132d1953c4c4f76798dd93a190f7d7e766b5b1f4d18c63c5ebb702fcd62f2fca599461f2274d18f5

  • SSDEEP

    49152:sye1w25G7E90e2xJvpHEszaSvX3IXd1kBfNIRWnKDR0sZYB03v+MdD/7O5C56Xt/:s5mE9B2/VaSvX3I1kBfNIMK5iB6fIs+

Malware Config

Targets

    • Target

      8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b.exe

    • Size

      3.2MB

    • MD5

      4735bb00bcb92c0c5d85599e289925ef

    • SHA1

      90dee1ecc8721777366e9c0d2d3c9fc2df6a925b

    • SHA256

      8d34477674ccda710d5acd22a1ea3ce7c9e818d7b6d3b19200c896fcf42f5b4b

    • SHA512

      673a67e73f8d3a31403cee50234d3160afe3eda75f75935677f9da0e955e28e67d9265c1a23c80b0fab7bd1aaa85ece8e3bf1bf085e76d9cbbd498a34a77287e

    • SSDEEP

      98304:BjxkN1YiQ2DmsiJb0D2OG5Mbser0ZAY8pD1X0C:B161YitDZiJoZgAY8pDl0

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks