General

  • Target

    ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a

  • Size

    1.3MB

  • Sample

    230203-metwpshf9s

  • MD5

    9ee1e7e713310e6436c4a5343e623a29

  • SHA1

    6a83fa048f1609ab2de9fee97ed8161a90012a8c

  • SHA256

    ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a

  • SHA512

    0a8baeff68d6ef0fa6e904dcc57c26a2eae2d1d0df945caa13f2a7586923fc41ea3693ea388dfafa25aebc10c1f645c84d7fd7a377e71ac463edf66ac57a9c47

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a

    • Size

      1.3MB

    • MD5

      9ee1e7e713310e6436c4a5343e623a29

    • SHA1

      6a83fa048f1609ab2de9fee97ed8161a90012a8c

    • SHA256

      ba90ca00578e631e9456ebc62d5cf241efd23e554295c214e08b1f32c18d227a

    • SHA512

      0a8baeff68d6ef0fa6e904dcc57c26a2eae2d1d0df945caa13f2a7586923fc41ea3693ea388dfafa25aebc10c1f645c84d7fd7a377e71ac463edf66ac57a9c47

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks