General

  • Target

    022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073

  • Size

    1.3MB

  • Sample

    221102-fpd5nsheb2

  • MD5

    94c4e0ec280884ed00549730d5c5d536

  • SHA1

    96634b960d00f36edeb80e10fbdd99ca65820218

  • SHA256

    022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073

  • SHA512

    54885cf0d27635c6b33246489ed1c731a0a8f8ed006aab725fd3f2d3f0146903c09acf4bb2f3afe885f6e9a3e672662fb44dfed9be257cf403b07a1159c6a31c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073

    • Size

      1.3MB

    • MD5

      94c4e0ec280884ed00549730d5c5d536

    • SHA1

      96634b960d00f36edeb80e10fbdd99ca65820218

    • SHA256

      022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073

    • SHA512

      54885cf0d27635c6b33246489ed1c731a0a8f8ed006aab725fd3f2d3f0146903c09acf4bb2f3afe885f6e9a3e672662fb44dfed9be257cf403b07a1159c6a31c

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks