General

  • Target

    RobloxVersionFix.exe

  • Size

    1.7MB

  • Sample

    250326-am8zdaykx2

  • MD5

    c4ecabd9a15748628acdb4eabe1f5733

  • SHA1

    2abc8d0b03faae2a3dfbb5b3ace7bb049a895a49

  • SHA256

    0c240b2768116ef0f03af241b177004e5e456ed9039744c8619956d0c960d31e

  • SHA512

    9d673547d7369a18f9254f1b73ea33aadb51e6c84da8c6de84f5fe0bd7e3813778f980ea6646ff32d1b981bc56c8751acfa877025cb835088ec72c2bea24e687

  • SSDEEP

    24576:h2G/nvxW3W70w+LhSRJVv14LegEY2nac1VbECN8Bz5jftyrp9+CA:hbA3pw+eJJ4pzZtU+

Malware Config

Targets

    • Target

      RobloxVersionFix.exe

    • Size

      1.7MB

    • MD5

      c4ecabd9a15748628acdb4eabe1f5733

    • SHA1

      2abc8d0b03faae2a3dfbb5b3ace7bb049a895a49

    • SHA256

      0c240b2768116ef0f03af241b177004e5e456ed9039744c8619956d0c960d31e

    • SHA512

      9d673547d7369a18f9254f1b73ea33aadb51e6c84da8c6de84f5fe0bd7e3813778f980ea6646ff32d1b981bc56c8751acfa877025cb835088ec72c2bea24e687

    • SSDEEP

      24576:h2G/nvxW3W70w+LhSRJVv14LegEY2nac1VbECN8Bz5jftyrp9+CA:hbA3pw+eJJ4pzZtU+

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks