General

  • Target

    fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97

  • Size

    1.3MB

  • Sample

    221031-16dwfseebq

  • MD5

    775dd71aaa703e4529a6c7942997f675

  • SHA1

    c93470d385b911c919034cf881bdde1fe3550362

  • SHA256

    fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97

  • SHA512

    d9df56ebda0634c962fd2efd6678f9cec643677ee3521acdecfa87436293b0137fd97c1fe14f849f36e7d1f7426a5f2353d264897606b91bbdd427de8ac90b4a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97

    • Size

      1.3MB

    • MD5

      775dd71aaa703e4529a6c7942997f675

    • SHA1

      c93470d385b911c919034cf881bdde1fe3550362

    • SHA256

      fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97

    • SHA512

      d9df56ebda0634c962fd2efd6678f9cec643677ee3521acdecfa87436293b0137fd97c1fe14f849f36e7d1f7426a5f2353d264897606b91bbdd427de8ac90b4a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks