General

  • Target

    HEUR-Trojan-Spy.MSIL.Stealer.gen-39a3a518c36b.exe

  • Size

    1.1MB

  • Sample

    230116-w26y8afa8t

  • MD5

    56180487c674bc5e9ae5346a8fa72b4a

  • SHA1

    86058ef7aecd0a9d3bc5f97809e1e0844ab68109

  • SHA256

    39a3a518c36b4c72d04a00171bfe84b36c830ef87afcd69c8d120abddafa97c8

  • SHA512

    27a051a7a6072e8556c6771648ebb16dffe2116c14e30c50ace66f3370b56904f35f96f8e18a628e16c35b3049f8f420523f90e0f46fa5f167211569280250c5

  • SSDEEP

    12288:7ooQ4tQRgvTUxOjOK2C6vo7FFPfvgPVQy3TiNUOckHd4qn4:7out+gvTUwjOK2C4oLPformNUOtH2+4

Score
10/10

Malware Config

Targets

    • Target

      HEUR-Trojan-Spy.MSIL.Stealer.gen-39a3a518c36b.exe

    • Size

      1.1MB

    • MD5

      56180487c674bc5e9ae5346a8fa72b4a

    • SHA1

      86058ef7aecd0a9d3bc5f97809e1e0844ab68109

    • SHA256

      39a3a518c36b4c72d04a00171bfe84b36c830ef87afcd69c8d120abddafa97c8

    • SHA512

      27a051a7a6072e8556c6771648ebb16dffe2116c14e30c50ace66f3370b56904f35f96f8e18a628e16c35b3049f8f420523f90e0f46fa5f167211569280250c5

    • SSDEEP

      12288:7ooQ4tQRgvTUxOjOK2C6vo7FFPfvgPVQy3TiNUOckHd4qn4:7out+gvTUwjOK2C4oLPformNUOtH2+4

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks