General

  • Target

    8b6307668faa5ed17a924afcb35bcadb92d51b08d67074c1d2bed96d451078c7

  • Size

    1.3MB

  • Sample

    221101-kgcdbshgd3

  • MD5

    d65ce2839b62a6ed6b492b25009c0cb6

  • SHA1

    9d285be3169b5e4dd2053aaed92d3da1c243f48a

  • SHA256

    8b6307668faa5ed17a924afcb35bcadb92d51b08d67074c1d2bed96d451078c7

  • SHA512

    703fef52a76d326bd975ac33e3d7459651be638032a73c03d3320d479c7ec2ccd044364591847c411377a2aa4eeb099579ec41a4145ffd904cb95ee38a01355b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      8b6307668faa5ed17a924afcb35bcadb92d51b08d67074c1d2bed96d451078c7

    • Size

      1.3MB

    • MD5

      d65ce2839b62a6ed6b492b25009c0cb6

    • SHA1

      9d285be3169b5e4dd2053aaed92d3da1c243f48a

    • SHA256

      8b6307668faa5ed17a924afcb35bcadb92d51b08d67074c1d2bed96d451078c7

    • SHA512

      703fef52a76d326bd975ac33e3d7459651be638032a73c03d3320d479c7ec2ccd044364591847c411377a2aa4eeb099579ec41a4145ffd904cb95ee38a01355b

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks