General

  • Target

    90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef

  • Size

    1.3MB

  • Sample

    230202-vhej7aec8s

  • MD5

    fb1d95832c729062efbd85c63670d637

  • SHA1

    064b5692e2b08b209aa08975248891814de4c9f5

  • SHA256

    90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef

  • SHA512

    cf2025467b0bac100e5802fccc3fdb47688db22fedc2e27d9b8c3ce1500e0355c4548d728638feecd08265533a294e42b6f2c50b65cec53497a7be8e1ee40318

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef

    • Size

      1.3MB

    • MD5

      fb1d95832c729062efbd85c63670d637

    • SHA1

      064b5692e2b08b209aa08975248891814de4c9f5

    • SHA256

      90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef

    • SHA512

      cf2025467b0bac100e5802fccc3fdb47688db22fedc2e27d9b8c3ce1500e0355c4548d728638feecd08265533a294e42b6f2c50b65cec53497a7be8e1ee40318

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks