General

  • Target

    0bcf1a7b50ed4504fdaf2e11cea6aea7.exe

  • Size

    2.3MB

  • Sample

    230121-pp14wadg21

  • MD5

    0bcf1a7b50ed4504fdaf2e11cea6aea7

  • SHA1

    3a7484b337392285c53212953c9cd9ca02c8070c

  • SHA256

    ae1688c122262eca8536d54c6bfcb14ce0181cadffa680600b6b9ed6f4cce0ae

  • SHA512

    8c3f614f1cb6d5c2d02013d2625af210096e33f56a3449321d4fee8b23f80eaab2a340af327316eb316d6d95099b6aa6bb82ea1b48d9409418ba603779ee1d97

  • SSDEEP

    49152:uUcZje2m3S7IdNuzPkAdmHsudtexRRuq0Ek4pbz6:uNe2KS7IAPkNHsG37gK

Score
10/10

Malware Config

Targets

    • Target

      0bcf1a7b50ed4504fdaf2e11cea6aea7.exe

    • Size

      2.3MB

    • MD5

      0bcf1a7b50ed4504fdaf2e11cea6aea7

    • SHA1

      3a7484b337392285c53212953c9cd9ca02c8070c

    • SHA256

      ae1688c122262eca8536d54c6bfcb14ce0181cadffa680600b6b9ed6f4cce0ae

    • SHA512

      8c3f614f1cb6d5c2d02013d2625af210096e33f56a3449321d4fee8b23f80eaab2a340af327316eb316d6d95099b6aa6bb82ea1b48d9409418ba603779ee1d97

    • SSDEEP

      49152:uUcZje2m3S7IdNuzPkAdmHsudtexRRuq0Ek4pbz6:uNe2KS7IAPkNHsG37gK

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks