General

  • Target

    addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5

  • Size

    1.3MB

  • Sample

    230202-pzxt7sac7s

  • MD5

    97de4daed939b69a10f6428de4f67f50

  • SHA1

    5da5c0d5d034703209f0d6aff2d4230528d89b4c

  • SHA256

    addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5

  • SHA512

    66a8f712048daf17a01c5994e321e752cbd7da8b30f639a32b196c8d801f0ca8d9f2a1f123ce78d608359baf37cc857b3bbc9826885d3f32ff3e0a432b2df34a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5

    • Size

      1.3MB

    • MD5

      97de4daed939b69a10f6428de4f67f50

    • SHA1

      5da5c0d5d034703209f0d6aff2d4230528d89b4c

    • SHA256

      addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5

    • SHA512

      66a8f712048daf17a01c5994e321e752cbd7da8b30f639a32b196c8d801f0ca8d9f2a1f123ce78d608359baf37cc857b3bbc9826885d3f32ff3e0a432b2df34a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks