General

  • Target

    a474624a8071af5f66588423cd21d50da390afde6037c5f9a00d07a1955f50b5

  • Size

    1.3MB

  • Sample

    221103-ak55psdab5

  • MD5

    8cdc5b28739b0b4b141116e158bd8ba5

  • SHA1

    a937e61dee2f2e93f4820d6d200c2d221c0e8bd4

  • SHA256

    a474624a8071af5f66588423cd21d50da390afde6037c5f9a00d07a1955f50b5

  • SHA512

    829486bc452cbff51cbf41adbf13c9a33574858bed1f1d0c88fd100cbeab918a67ce30a3ff54792769866a20ad52733791852317842cf7157867360d7c26029f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      a474624a8071af5f66588423cd21d50da390afde6037c5f9a00d07a1955f50b5

    • Size

      1.3MB

    • MD5

      8cdc5b28739b0b4b141116e158bd8ba5

    • SHA1

      a937e61dee2f2e93f4820d6d200c2d221c0e8bd4

    • SHA256

      a474624a8071af5f66588423cd21d50da390afde6037c5f9a00d07a1955f50b5

    • SHA512

      829486bc452cbff51cbf41adbf13c9a33574858bed1f1d0c88fd100cbeab918a67ce30a3ff54792769866a20ad52733791852317842cf7157867360d7c26029f

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks