General

  • Target

    78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199

  • Size

    1.3MB

  • Sample

    230203-dl8trsac42

  • MD5

    4ef031db663c197163f81187ce6a86a7

  • SHA1

    f0d7dc4856a99dbc25521e2473a1b0240e5b01e0

  • SHA256

    78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199

  • SHA512

    ffdf04340164f29dbf4a244dae0fd6f22780ad3538d09a3d55f3ec2593ce60899e58185030391d08779dd0b013b93e909a006858585273a0eb7d2df313a32524

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199

    • Size

      1.3MB

    • MD5

      4ef031db663c197163f81187ce6a86a7

    • SHA1

      f0d7dc4856a99dbc25521e2473a1b0240e5b01e0

    • SHA256

      78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199

    • SHA512

      ffdf04340164f29dbf4a244dae0fd6f22780ad3538d09a3d55f3ec2593ce60899e58185030391d08779dd0b013b93e909a006858585273a0eb7d2df313a32524

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks