General

  • Target

    09cacacf6eef86e62b26d5d1ca217c8e.exe

  • Size

    2.6MB

  • Sample

    230321-zkafgafa5w

  • MD5

    09cacacf6eef86e62b26d5d1ca217c8e

  • SHA1

    21520171163005980651861cea13fc6edc82d2da

  • SHA256

    abee8542dc156b695a019d34a7bf3734d2e63b648e4affb3209b151ab0f8e6ac

  • SHA512

    fc90917fa408769cef02c977ff4a0f30a6b14e0fe0731a7ccd573c63da9523e48d58914c5a26b4f5d3d8faee47ea3d32ccbf5e462e802dd7b3cc23e6ad6fd4c6

  • SSDEEP

    49152:ubA3jlSSI+tkWr2mvKSq32s+FBf4HrypMFQtwfRKSSutCn0:ubcSbWr2mLHyC8LSut1

Score
10/10

Malware Config

Targets

    • Target

      09cacacf6eef86e62b26d5d1ca217c8e.exe

    • Size

      2.6MB

    • MD5

      09cacacf6eef86e62b26d5d1ca217c8e

    • SHA1

      21520171163005980651861cea13fc6edc82d2da

    • SHA256

      abee8542dc156b695a019d34a7bf3734d2e63b648e4affb3209b151ab0f8e6ac

    • SHA512

      fc90917fa408769cef02c977ff4a0f30a6b14e0fe0731a7ccd573c63da9523e48d58914c5a26b4f5d3d8faee47ea3d32ccbf5e462e802dd7b3cc23e6ad6fd4c6

    • SSDEEP

      49152:ubA3jlSSI+tkWr2mvKSq32s+FBf4HrypMFQtwfRKSSutCn0:ubcSbWr2mLHyC8LSut1

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks