General

  • Target

    8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915

  • Size

    1.3MB

  • Sample

    230202-1jkeqagb28

  • MD5

    66fa4e368bff9805b15a0596727f9bed

  • SHA1

    d61ac1e1deccf7d8f9105dffbe8b44515c825eab

  • SHA256

    8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915

  • SHA512

    0db3b99e5f8d69f6e38756b4ca75c18a6233b7ae36aebb7ab476177bf589767811476e0452ff1effbefe21ef7fe6d066278b3c3417509856f56024620547d582

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915

    • Size

      1.3MB

    • MD5

      66fa4e368bff9805b15a0596727f9bed

    • SHA1

      d61ac1e1deccf7d8f9105dffbe8b44515c825eab

    • SHA256

      8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915

    • SHA512

      0db3b99e5f8d69f6e38756b4ca75c18a6233b7ae36aebb7ab476177bf589767811476e0452ff1effbefe21ef7fe6d066278b3c3417509856f56024620547d582

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks