General

  • Target

    ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1

  • Size

    1.3MB

  • Sample

    221101-3lhp1sfhe2

  • MD5

    15110e106dc1756997c5fd148b42c8e7

  • SHA1

    a495cdc3212e4989ee341db58c715345aeb4d8cb

  • SHA256

    ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1

  • SHA512

    96526795104e472ebda08b18ed0434e704dfeb0f6f9b1bbe1be4455b21099cd7705d456ea4dfefda64bde48c9bc626d70027f2aff978efd3cd5a8c1a6853157e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1

    • Size

      1.3MB

    • MD5

      15110e106dc1756997c5fd148b42c8e7

    • SHA1

      a495cdc3212e4989ee341db58c715345aeb4d8cb

    • SHA256

      ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1

    • SHA512

      96526795104e472ebda08b18ed0434e704dfeb0f6f9b1bbe1be4455b21099cd7705d456ea4dfefda64bde48c9bc626d70027f2aff978efd3cd5a8c1a6853157e

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks