General

  • Target

    81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f

  • Size

    1.3MB

  • Sample

    230203-dp5xaaac72

  • MD5

    f206092cfca74c5216dacd3b2c45c935

  • SHA1

    275ad5f65bc3d91ad9d41df35b1b34116175ffd8

  • SHA256

    81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f

  • SHA512

    df13f3437e2c84851ad97e6c6ffeab4bc92f3fdceeab4bde7e8c1ac58f58c37c97ca5d2bb647142c5f8a3e4e9be8bad4827b0822c0acef3055eac0b762183ff2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f

    • Size

      1.3MB

    • MD5

      f206092cfca74c5216dacd3b2c45c935

    • SHA1

      275ad5f65bc3d91ad9d41df35b1b34116175ffd8

    • SHA256

      81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f

    • SHA512

      df13f3437e2c84851ad97e6c6ffeab4bc92f3fdceeab4bde7e8c1ac58f58c37c97ca5d2bb647142c5f8a3e4e9be8bad4827b0822c0acef3055eac0b762183ff2

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks