General

  • Target

    b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804

  • Size

    1.3MB

  • Sample

    221101-khs3gaafck

  • MD5

    123b77cbdba6713ae0c268f1f5ea0e0a

  • SHA1

    587e9af6c8badcd157bd276fe16eb150686c1667

  • SHA256

    b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804

  • SHA512

    ad27ef0a6557c7f93419179759bc3708fb6fd0570c2b8f79db973f40880c5fa1ee2057a6513b4b0b43302efa41483ec5d41fac5f7606a60182f01ac4568a07f2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804

    • Size

      1.3MB

    • MD5

      123b77cbdba6713ae0c268f1f5ea0e0a

    • SHA1

      587e9af6c8badcd157bd276fe16eb150686c1667

    • SHA256

      b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804

    • SHA512

      ad27ef0a6557c7f93419179759bc3708fb6fd0570c2b8f79db973f40880c5fa1ee2057a6513b4b0b43302efa41483ec5d41fac5f7606a60182f01ac4568a07f2

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks