General

  • Target

    76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64

  • Size

    1.3MB

  • Sample

    221102-f2ft2aacer

  • MD5

    9e8106f7ae8e8f19426c3b7b7481428a

  • SHA1

    c7b3dd896230a96aba93e3b3fb58f831033cccb7

  • SHA256

    76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64

  • SHA512

    2fdd60ca2b345eb2ab5729d27cd6c859345a5090d7cc7b74be43cf1fb8748f3fae22795fda33155b8e036a03eb956dc3033d5153bfb3bdcb85d140d25004180d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64

    • Size

      1.3MB

    • MD5

      9e8106f7ae8e8f19426c3b7b7481428a

    • SHA1

      c7b3dd896230a96aba93e3b3fb58f831033cccb7

    • SHA256

      76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64

    • SHA512

      2fdd60ca2b345eb2ab5729d27cd6c859345a5090d7cc7b74be43cf1fb8748f3fae22795fda33155b8e036a03eb956dc3033d5153bfb3bdcb85d140d25004180d

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks