General

  • Target

    e7c9f9dfd421d9f79e1d47002d6e200c8a4d4cfdd96fa01fba1a1783695b0840

  • Size

    1.3MB

  • Sample

    230203-cqpq1sdc4v

  • MD5

    7f0cb282257ad4b7d6c303d2ceb6c11d

  • SHA1

    8be5f895a5643a4f249275b7426c7b2bce16a8bb

  • SHA256

    e7c9f9dfd421d9f79e1d47002d6e200c8a4d4cfdd96fa01fba1a1783695b0840

  • SHA512

    7b4a0b6580f4dc088da593e5154bb731ac63f6e94ea7fdd0a60351f95faa37e55bac36b02a638c5d9b5c491354c585cca75bc51d7593b02b37ad41367ebda6ff

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      e7c9f9dfd421d9f79e1d47002d6e200c8a4d4cfdd96fa01fba1a1783695b0840

    • Size

      1.3MB

    • MD5

      7f0cb282257ad4b7d6c303d2ceb6c11d

    • SHA1

      8be5f895a5643a4f249275b7426c7b2bce16a8bb

    • SHA256

      e7c9f9dfd421d9f79e1d47002d6e200c8a4d4cfdd96fa01fba1a1783695b0840

    • SHA512

      7b4a0b6580f4dc088da593e5154bb731ac63f6e94ea7fdd0a60351f95faa37e55bac36b02a638c5d9b5c491354c585cca75bc51d7593b02b37ad41367ebda6ff

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks