General

  • Target

    4220c2e366f7e69ee3f195b6b51b350bf6f7ae3184a40cf5b445741942f73acd

  • Size

    1.3MB

  • Sample

    230202-y4ec4aae2z

  • MD5

    fc021897699a09d266926d5c54840a5b

  • SHA1

    07c7b0956cd4d205346710bb728e5e53f31e5a80

  • SHA256

    4220c2e366f7e69ee3f195b6b51b350bf6f7ae3184a40cf5b445741942f73acd

  • SHA512

    e59fd6efeb8bc2d2816afecb19f468cff79dda665aac25a89c4bbbb7ad28a2112019f6018879f2b7d378c841582a1a907c2504148b88192818129e0259a64046

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      4220c2e366f7e69ee3f195b6b51b350bf6f7ae3184a40cf5b445741942f73acd

    • Size

      1.3MB

    • MD5

      fc021897699a09d266926d5c54840a5b

    • SHA1

      07c7b0956cd4d205346710bb728e5e53f31e5a80

    • SHA256

      4220c2e366f7e69ee3f195b6b51b350bf6f7ae3184a40cf5b445741942f73acd

    • SHA512

      e59fd6efeb8bc2d2816afecb19f468cff79dda665aac25a89c4bbbb7ad28a2112019f6018879f2b7d378c841582a1a907c2504148b88192818129e0259a64046

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks