General

  • Target

    1a53fcad2b898bd5de0d478c0e4f801202c51e2dceb0d7c5fca06ede4a13d3ad

  • Size

    1.3MB

  • Sample

    230203-dt777sdf4s

  • MD5

    8e7e03cb90582a3b598bc16f1a3926b5

  • SHA1

    0d9db0722574eb9ec34b609e26303605f26299b4

  • SHA256

    1a53fcad2b898bd5de0d478c0e4f801202c51e2dceb0d7c5fca06ede4a13d3ad

  • SHA512

    68885f5f240411f2c2a32c8d49514727048490c7261fbbacb5824b90017c47862b51835f114deac34a1006032ef3f7aa5fbb3367e7d939a85e28d0615389a1e0

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      1a53fcad2b898bd5de0d478c0e4f801202c51e2dceb0d7c5fca06ede4a13d3ad

    • Size

      1.3MB

    • MD5

      8e7e03cb90582a3b598bc16f1a3926b5

    • SHA1

      0d9db0722574eb9ec34b609e26303605f26299b4

    • SHA256

      1a53fcad2b898bd5de0d478c0e4f801202c51e2dceb0d7c5fca06ede4a13d3ad

    • SHA512

      68885f5f240411f2c2a32c8d49514727048490c7261fbbacb5824b90017c47862b51835f114deac34a1006032ef3f7aa5fbb3367e7d939a85e28d0615389a1e0

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks