General

  • Target

    a676f74d953a5b6220191044bd6993d713fd5549bd93718fae7f8af0618bba45

  • Size

    1.3MB

  • Sample

    221031-2hjmgaefhk

  • MD5

    2226f435ba0447b33f5c9f56f3ab5b5a

  • SHA1

    3da1cc1d12a285c4847141470d0b2e7e6a848c60

  • SHA256

    a676f74d953a5b6220191044bd6993d713fd5549bd93718fae7f8af0618bba45

  • SHA512

    c6a6e03bfa179effa392779c3a9051969df21ac5920c989b478876465ff694d5a9434b683e5a57ab925bc68b32524750bde7322dce2bf171e415dab60275f12d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      a676f74d953a5b6220191044bd6993d713fd5549bd93718fae7f8af0618bba45

    • Size

      1.3MB

    • MD5

      2226f435ba0447b33f5c9f56f3ab5b5a

    • SHA1

      3da1cc1d12a285c4847141470d0b2e7e6a848c60

    • SHA256

      a676f74d953a5b6220191044bd6993d713fd5549bd93718fae7f8af0618bba45

    • SHA512

      c6a6e03bfa179effa392779c3a9051969df21ac5920c989b478876465ff694d5a9434b683e5a57ab925bc68b32524750bde7322dce2bf171e415dab60275f12d

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks