General

  • Target

    06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736

  • Size

    1.3MB

  • Sample

    221101-dv23ksgefj

  • MD5

    efa0f8d3b7e871a26271c75281d4fc0c

  • SHA1

    0f3a1a6348ad9c32aaa16a92c7b4ff49d7c07faa

  • SHA256

    06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736

  • SHA512

    5cdd4756020b4ff995be449ea13b384ac6356b57a69c97615daf88f2a4150b5dd443c9a1acdf61ecf1a50e31ec37d7a87a7dee684c715c1ca1f22a75ff403cad

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736

    • Size

      1.3MB

    • MD5

      efa0f8d3b7e871a26271c75281d4fc0c

    • SHA1

      0f3a1a6348ad9c32aaa16a92c7b4ff49d7c07faa

    • SHA256

      06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736

    • SHA512

      5cdd4756020b4ff995be449ea13b384ac6356b57a69c97615daf88f2a4150b5dd443c9a1acdf61ecf1a50e31ec37d7a87a7dee684c715c1ca1f22a75ff403cad

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks