General

  • Target

    fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea

  • Size

    1.3MB

  • Sample

    221031-xd5lxsbhg9

  • MD5

    9d4c63f291700110d07ddfc99c070c1e

  • SHA1

    8e74a2b4ffe3ad31e86bc449bd267bacdabac3a2

  • SHA256

    fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea

  • SHA512

    444e6e3ff167c7c21bd45cefb582afeeb30e0e6150fa8b411af50c4d270fc2e6202aa7add562223393c15ab68850ec05b67f93a35fcbac441f95922e0b988aa2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea

    • Size

      1.3MB

    • MD5

      9d4c63f291700110d07ddfc99c070c1e

    • SHA1

      8e74a2b4ffe3ad31e86bc449bd267bacdabac3a2

    • SHA256

      fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea

    • SHA512

      444e6e3ff167c7c21bd45cefb582afeeb30e0e6150fa8b411af50c4d270fc2e6202aa7add562223393c15ab68850ec05b67f93a35fcbac441f95922e0b988aa2

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks