General

  • Target

    f203417bb3524f8af51d9cf92a6bcb6dc5530925178a1bf7dcd3a30939f48502

  • Size

    1.3MB

  • Sample

    230203-fhv5lsba64

  • MD5

    275e4701870524ff19d7ddf53f96337b

  • SHA1

    a194312f8180ee482a1ba7dbf2c74a4a28a78e50

  • SHA256

    f203417bb3524f8af51d9cf92a6bcb6dc5530925178a1bf7dcd3a30939f48502

  • SHA512

    b481a5ac52bfa575b7d56ad9b974d84259b2f1a8f89362a54ba3bb5ed677f2a79894654d53d65917fe433638b663689dd9e04b856481fbbe68dd7660a10eb93d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      f203417bb3524f8af51d9cf92a6bcb6dc5530925178a1bf7dcd3a30939f48502

    • Size

      1.3MB

    • MD5

      275e4701870524ff19d7ddf53f96337b

    • SHA1

      a194312f8180ee482a1ba7dbf2c74a4a28a78e50

    • SHA256

      f203417bb3524f8af51d9cf92a6bcb6dc5530925178a1bf7dcd3a30939f48502

    • SHA512

      b481a5ac52bfa575b7d56ad9b974d84259b2f1a8f89362a54ba3bb5ed677f2a79894654d53d65917fe433638b663689dd9e04b856481fbbe68dd7660a10eb93d

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks