General

  • Target

    45b39f54b75173309a4a8bc2a716e4e7331bee37df16da32f683f3ab3bdb6e71

  • Size

    1.3MB

  • Sample

    230202-25el2agg65

  • MD5

    a022cca1050a171c89b30be03d8893a2

  • SHA1

    8a01266ff80bb15466b1cbf929beee0919f5e362

  • SHA256

    45b39f54b75173309a4a8bc2a716e4e7331bee37df16da32f683f3ab3bdb6e71

  • SHA512

    d44900ddb4d0619add330bc7b4243893d01c80239158a5026b8248b19fadd01543b8d62737dc65102937900649cfa9b5ce6450fe30274511feb48305db34aa0f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      45b39f54b75173309a4a8bc2a716e4e7331bee37df16da32f683f3ab3bdb6e71

    • Size

      1.3MB

    • MD5

      a022cca1050a171c89b30be03d8893a2

    • SHA1

      8a01266ff80bb15466b1cbf929beee0919f5e362

    • SHA256

      45b39f54b75173309a4a8bc2a716e4e7331bee37df16da32f683f3ab3bdb6e71

    • SHA512

      d44900ddb4d0619add330bc7b4243893d01c80239158a5026b8248b19fadd01543b8d62737dc65102937900649cfa9b5ce6450fe30274511feb48305db34aa0f

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks