General

  • Target

    1e6bfb613bd0d021d5d5905f1d8f3847c647ea09af4aa8cebf81059377e21670

  • Size

    1.3MB

  • Sample

    221101-gwtdlsggb8

  • MD5

    a01a1c76c701afe3ef856ff5037fcf7e

  • SHA1

    8e16d7d198db61b54bea818b14017a4be469d629

  • SHA256

    1e6bfb613bd0d021d5d5905f1d8f3847c647ea09af4aa8cebf81059377e21670

  • SHA512

    357031de81fc5586e4252e4009862094aec67734da8182ac30f13afd5f939b773b780018f6aed9869d9a25401f1bac496cd7164a5b063bb6d8948c408a1a3b3f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      1e6bfb613bd0d021d5d5905f1d8f3847c647ea09af4aa8cebf81059377e21670

    • Size

      1.3MB

    • MD5

      a01a1c76c701afe3ef856ff5037fcf7e

    • SHA1

      8e16d7d198db61b54bea818b14017a4be469d629

    • SHA256

      1e6bfb613bd0d021d5d5905f1d8f3847c647ea09af4aa8cebf81059377e21670

    • SHA512

      357031de81fc5586e4252e4009862094aec67734da8182ac30f13afd5f939b773b780018f6aed9869d9a25401f1bac496cd7164a5b063bb6d8948c408a1a3b3f

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks