General

  • Target

    Angry Birds 2.exe

  • Size

    1.1MB

  • Sample

    230117-j29nwsgf8t

  • MD5

    99f1d94cab81d93689759e6445b3b7e5

  • SHA1

    b1008d26702a163cc6d410a556395e1d6698fdc5

  • SHA256

    7f3a265da77dcd6105bcfc8ea0b8e3282b010a71444af9f35de2c4cd0a3526fe

  • SHA512

    e537a375bb827a19d8cabe6d0d3fa274da6551663c54c374716a77073c6e805e51bcf77fce4d4f3945b6b77b8068bca887ed8c6c1644ceb797a9ce516def3920

  • SSDEEP

    12288:aRZ+IoG/n9IQxW3OBsee2X+t4Rb0kWHaSX9p6Bqtbqq/kj+O7kxDdEg0oPoC6mJr:U2G/nvxW3Ww0t1W6c9IBE+8woDyfpCrj

Score
10/10

Malware Config

Targets

    • Target

      Angry Birds 2.exe

    • Size

      1.1MB

    • MD5

      99f1d94cab81d93689759e6445b3b7e5

    • SHA1

      b1008d26702a163cc6d410a556395e1d6698fdc5

    • SHA256

      7f3a265da77dcd6105bcfc8ea0b8e3282b010a71444af9f35de2c4cd0a3526fe

    • SHA512

      e537a375bb827a19d8cabe6d0d3fa274da6551663c54c374716a77073c6e805e51bcf77fce4d4f3945b6b77b8068bca887ed8c6c1644ceb797a9ce516def3920

    • SSDEEP

      12288:aRZ+IoG/n9IQxW3OBsee2X+t4Rb0kWHaSX9p6Bqtbqq/kj+O7kxDdEg0oPoC6mJr:U2G/nvxW3Ww0t1W6c9IBE+8woDyfpCrj

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks