General

  • Target

    f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce

  • Size

    1.3MB

  • Sample

    230202-3mls3aha27

  • MD5

    e2bc4b8000e0fe4b6f096669c4b8034b

  • SHA1

    bcaeafcd6723d224ffa3fc505c1d1451989ecdc1

  • SHA256

    f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce

  • SHA512

    0180b330254c9277a1a868444318486090d8495d757e96725eda282d6c485cbb596bea42ffdfa6850e0491cc73af6d8b2d32c4f819589bb59ea7de62de45bc73

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce

    • Size

      1.3MB

    • MD5

      e2bc4b8000e0fe4b6f096669c4b8034b

    • SHA1

      bcaeafcd6723d224ffa3fc505c1d1451989ecdc1

    • SHA256

      f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce

    • SHA512

      0180b330254c9277a1a868444318486090d8495d757e96725eda282d6c485cbb596bea42ffdfa6850e0491cc73af6d8b2d32c4f819589bb59ea7de62de45bc73

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks