General

  • Target

    fcc464400d0c3062e5ff9b70c58e7f509339535c2f769f0903ebfeb752b6a055

  • Size

    1.3MB

  • Sample

    221101-a9a1vseff7

  • MD5

    e789d14f8dfdabf5e17b3985a6a7ea64

  • SHA1

    a7239f4692ac0dcaa9d53bd97991ec998a637d1d

  • SHA256

    fcc464400d0c3062e5ff9b70c58e7f509339535c2f769f0903ebfeb752b6a055

  • SHA512

    4feca093dcae95bad445ee9d983fe81c6112e878ad9aa635f856117b887bb8a592051ae952316870f28af280d8e6952cd18c5a6abeadeacb15b2c13e56793226

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      fcc464400d0c3062e5ff9b70c58e7f509339535c2f769f0903ebfeb752b6a055

    • Size

      1.3MB

    • MD5

      e789d14f8dfdabf5e17b3985a6a7ea64

    • SHA1

      a7239f4692ac0dcaa9d53bd97991ec998a637d1d

    • SHA256

      fcc464400d0c3062e5ff9b70c58e7f509339535c2f769f0903ebfeb752b6a055

    • SHA512

      4feca093dcae95bad445ee9d983fe81c6112e878ad9aa635f856117b887bb8a592051ae952316870f28af280d8e6952cd18c5a6abeadeacb15b2c13e56793226

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks