General

  • Target

    9cce6a4505932f1b2591d7e4a6b7a6eb1cc6642d4a25f30ae5afc72cde8a0b5e

  • Size

    1.3MB

  • Sample

    221101-r4r6madfck

  • MD5

    852410ab46ca7a98f88810461e4331bc

  • SHA1

    d4fce5ddb5f70e44d37304bece6478f3f8f964ff

  • SHA256

    9cce6a4505932f1b2591d7e4a6b7a6eb1cc6642d4a25f30ae5afc72cde8a0b5e

  • SHA512

    9f4968e9dfd2b3046c4138add99d86bba70d695127e18fa093d0747cc7b5205a839aafd5e8b7b9d351290f270150d605dbc36661e4bd0d5613c81f24834947ff

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      9cce6a4505932f1b2591d7e4a6b7a6eb1cc6642d4a25f30ae5afc72cde8a0b5e

    • Size

      1.3MB

    • MD5

      852410ab46ca7a98f88810461e4331bc

    • SHA1

      d4fce5ddb5f70e44d37304bece6478f3f8f964ff

    • SHA256

      9cce6a4505932f1b2591d7e4a6b7a6eb1cc6642d4a25f30ae5afc72cde8a0b5e

    • SHA512

      9f4968e9dfd2b3046c4138add99d86bba70d695127e18fa093d0747cc7b5205a839aafd5e8b7b9d351290f270150d605dbc36661e4bd0d5613c81f24834947ff

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks