General

  • Target

    3e768e451d52a0512ddb5574e636294e1e593ddcf7fe762f1674ee8aae4f6345

  • Size

    1.3MB

  • Sample

    230203-g16jqsfb5w

  • MD5

    ddddab5a853e5bbaf89f8ae6692ac0f0

  • SHA1

    05efcb4325c061967278380d549ef36195127151

  • SHA256

    3e768e451d52a0512ddb5574e636294e1e593ddcf7fe762f1674ee8aae4f6345

  • SHA512

    deddfd9f99576d5039e4af14e36ebba1c327b98ca35160ec585988a9c7d35aba5ec816cc41ff8e3b9427aebd6747b8f5811678540a1c6c4f816f65d085d66f4a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      3e768e451d52a0512ddb5574e636294e1e593ddcf7fe762f1674ee8aae4f6345

    • Size

      1.3MB

    • MD5

      ddddab5a853e5bbaf89f8ae6692ac0f0

    • SHA1

      05efcb4325c061967278380d549ef36195127151

    • SHA256

      3e768e451d52a0512ddb5574e636294e1e593ddcf7fe762f1674ee8aae4f6345

    • SHA512

      deddfd9f99576d5039e4af14e36ebba1c327b98ca35160ec585988a9c7d35aba5ec816cc41ff8e3b9427aebd6747b8f5811678540a1c6c4f816f65d085d66f4a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks