General

  • Target

    c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf

  • Size

    1.3MB

  • Sample

    221103-majj6shbd2

  • MD5

    9b8446aad6b02a8c58a9ee3728e38b98

  • SHA1

    57a31a7fa23b11890468542b5b295f55eaeb29d1

  • SHA256

    c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf

  • SHA512

    c9134f2af6ea50c30a8218e50c5691c5089a8a5d27c8a997059cbc3ff8e7dee82e0ec03008e0cf6a993c5fa23a9be86830c8c9261e5c2ddc171937b8ba06079a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf

    • Size

      1.3MB

    • MD5

      9b8446aad6b02a8c58a9ee3728e38b98

    • SHA1

      57a31a7fa23b11890468542b5b295f55eaeb29d1

    • SHA256

      c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf

    • SHA512

      c9134f2af6ea50c30a8218e50c5691c5089a8a5d27c8a997059cbc3ff8e7dee82e0ec03008e0cf6a993c5fa23a9be86830c8c9261e5c2ddc171937b8ba06079a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks