General

  • Target

    d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa

  • Size

    1.3MB

  • Sample

    221101-ml3gesbhbk

  • MD5

    a3d95e75d5a46fd397e8636314fafb63

  • SHA1

    b603e3bde613faef6079d75e352abcf19d807cf2

  • SHA256

    d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa

  • SHA512

    36089c386fa6a28dab53141f5f617048e14e65e68175ca39dba192512f72e279e2290d23011b8eabc9c8a06e026214077c7145c85d68a34fbd30e7228b32b582

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa

    • Size

      1.3MB

    • MD5

      a3d95e75d5a46fd397e8636314fafb63

    • SHA1

      b603e3bde613faef6079d75e352abcf19d807cf2

    • SHA256

      d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa

    • SHA512

      36089c386fa6a28dab53141f5f617048e14e65e68175ca39dba192512f72e279e2290d23011b8eabc9c8a06e026214077c7145c85d68a34fbd30e7228b32b582

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks