General

  • Target

    245ed2db66c841556f3d7b52ab251030.exe

  • Size

    1.2MB

  • Sample

    220513-1c14wsbhb8

  • MD5

    245ed2db66c841556f3d7b52ab251030

  • SHA1

    8f12f472db36bf57ac7f2a02f21549d1559c672c

  • SHA256

    f698f53c372a26a4ab1ecd516064546fcd24da106293786c04e638de3582b2cd

  • SHA512

    6d5cdac70c9f090d472d4baa378c87d0bc7b582606f2767938b011401bfa6822cd7159c62ff58369c2d2c017654624a49134687879229f42673e4a785f47a0d6

Malware Config

Targets

    • Target

      245ed2db66c841556f3d7b52ab251030.exe

    • Size

      1.2MB

    • MD5

      245ed2db66c841556f3d7b52ab251030

    • SHA1

      8f12f472db36bf57ac7f2a02f21549d1559c672c

    • SHA256

      f698f53c372a26a4ab1ecd516064546fcd24da106293786c04e638de3582b2cd

    • SHA512

      6d5cdac70c9f090d472d4baa378c87d0bc7b582606f2767938b011401bfa6822cd7159c62ff58369c2d2c017654624a49134687879229f42673e4a785f47a0d6

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • suricata: ET MALWARE DCRAT Activity (GET)

      suricata: ET MALWARE DCRAT Activity (GET)

    • DCRat Payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks