General

  • Target

    62bd60de8691709819dddeecf2cac1dd8f10d40f6d8873e76ec6f2c1caaff0c3

  • Size

    1.3MB

  • Sample

    230203-gj7qgaeh2w

  • MD5

    f084f9f153fe12a3ba1cd4e3f0a61b5d

  • SHA1

    bc99277c99a4ba6f00276ac54ecdf1da7c4f660a

  • SHA256

    62bd60de8691709819dddeecf2cac1dd8f10d40f6d8873e76ec6f2c1caaff0c3

  • SHA512

    9b3e09e761088dc3ebeb33b2b3083ae6c0589895a55c9c37ac91353418a3cff876ccfd4161a66a85ef6191094c17b7138ed05e2ebdc1e716a8a079a9e6004595

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      62bd60de8691709819dddeecf2cac1dd8f10d40f6d8873e76ec6f2c1caaff0c3

    • Size

      1.3MB

    • MD5

      f084f9f153fe12a3ba1cd4e3f0a61b5d

    • SHA1

      bc99277c99a4ba6f00276ac54ecdf1da7c4f660a

    • SHA256

      62bd60de8691709819dddeecf2cac1dd8f10d40f6d8873e76ec6f2c1caaff0c3

    • SHA512

      9b3e09e761088dc3ebeb33b2b3083ae6c0589895a55c9c37ac91353418a3cff876ccfd4161a66a85ef6191094c17b7138ed05e2ebdc1e716a8a079a9e6004595

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks