General

  • Target

    b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e

  • Size

    1.3MB

  • Sample

    221105-vxsqcsbagr

  • MD5

    21cf8c9db48f0e9680204b3214c0ee7c

  • SHA1

    47f18a61e60f493cc581a9e1456eea5b8260ab2c

  • SHA256

    b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e

  • SHA512

    57a17dcaca17ae88996c39796c94d2863433aaf19492575931cf4c5db976e7c6704644c1bd01547646f9fd6dfcd6c64d2a984e6f5a1c4f2ffed9944e4eb33758

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e

    • Size

      1.3MB

    • MD5

      21cf8c9db48f0e9680204b3214c0ee7c

    • SHA1

      47f18a61e60f493cc581a9e1456eea5b8260ab2c

    • SHA256

      b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e

    • SHA512

      57a17dcaca17ae88996c39796c94d2863433aaf19492575931cf4c5db976e7c6704644c1bd01547646f9fd6dfcd6c64d2a984e6f5a1c4f2ffed9944e4eb33758

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks