General

  • Target

    30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4

  • Size

    1.3MB

  • Sample

    230202-wddb1aba4v

  • MD5

    e8c0b25506c9903293eb8f07b4cbff27

  • SHA1

    f1867544fe032e1233ba1c9034c07ea8a09d288d

  • SHA256

    30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4

  • SHA512

    ae9c39a01f7f92ba0ac0eae25c1f9875ecbc82c9b690249944d2caef190db35c6f7c6ca872f16037f2e1160bda4d7d2605adf3c8dfd006228a0de77f422c887b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4

    • Size

      1.3MB

    • MD5

      e8c0b25506c9903293eb8f07b4cbff27

    • SHA1

      f1867544fe032e1233ba1c9034c07ea8a09d288d

    • SHA256

      30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4

    • SHA512

      ae9c39a01f7f92ba0ac0eae25c1f9875ecbc82c9b690249944d2caef190db35c6f7c6ca872f16037f2e1160bda4d7d2605adf3c8dfd006228a0de77f422c887b

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks