General

  • Target

    d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524

  • Size

    1.3MB

  • Sample

    221101-mwqklscabj

  • MD5

    fb7aef145d8187ac9efd6cbba7d156a7

  • SHA1

    d59f20d2565a41723aa5260295c6ca6ea18fedfa

  • SHA256

    d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524

  • SHA512

    be88031dadd166fb517ea94b8ebd741c7eb7be566174e391aaef4bd074fbbe71e079e1f0f4e516b1cab9d62910652fafc3468fd90e79c041372e41aeff635393

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524

    • Size

      1.3MB

    • MD5

      fb7aef145d8187ac9efd6cbba7d156a7

    • SHA1

      d59f20d2565a41723aa5260295c6ca6ea18fedfa

    • SHA256

      d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524

    • SHA512

      be88031dadd166fb517ea94b8ebd741c7eb7be566174e391aaef4bd074fbbe71e079e1f0f4e516b1cab9d62910652fafc3468fd90e79c041372e41aeff635393

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks