General

  • Target

    319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6

  • Size

    1.3MB

  • Sample

    221102-mmqh9abbe9

  • MD5

    070801084b08d2473c0c98c020632130

  • SHA1

    26bbc11d9a8b57182f91ff1013a0714655eb35d6

  • SHA256

    319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6

  • SHA512

    1d2386b4db2e3cba5e020d50cfd1f816e7f749daf0b57d3eb82147ec317fc3101f8594247fa61e8d21af383df20ebb47f30340a831c6207a4329ce792ee9c3be

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6

    • Size

      1.3MB

    • MD5

      070801084b08d2473c0c98c020632130

    • SHA1

      26bbc11d9a8b57182f91ff1013a0714655eb35d6

    • SHA256

      319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6

    • SHA512

      1d2386b4db2e3cba5e020d50cfd1f816e7f749daf0b57d3eb82147ec317fc3101f8594247fa61e8d21af383df20ebb47f30340a831c6207a4329ce792ee9c3be

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks