General

  • Target

    ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4

  • Size

    315KB

  • Sample

    230508-cp839sgf58

  • MD5

    d3855e12436fa13461cb31f90bbb49de

  • SHA1

    aede824b4aa017bc39a4df466cb3de26bfa34bc8

  • SHA256

    ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4

  • SHA512

    1f3521c449127cc6b14eaf3fdfc199be35b0206f9522dc65a588204b7694a18b9000d4c6dbfebf5ad4d923b750d74169cb71f9596860be096cec1d130f0f9c7c

  • SSDEEP

    6144:GHFyN3U5hoSYEDtsUp0QiMKyIXF0tfaymknRvRo8//5SIbVVwCqy:GsNE5uotsCKyE09eknRvRoM5SuR

Score
10/10

Malware Config

Targets

    • Target

      ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4

    • Size

      315KB

    • MD5

      d3855e12436fa13461cb31f90bbb49de

    • SHA1

      aede824b4aa017bc39a4df466cb3de26bfa34bc8

    • SHA256

      ceaea02e8e0b3830a756fc5a5f60e28cd2eb7626fc7ec88fc67478adb98be2a4

    • SHA512

      1f3521c449127cc6b14eaf3fdfc199be35b0206f9522dc65a588204b7694a18b9000d4c6dbfebf5ad4d923b750d74169cb71f9596860be096cec1d130f0f9c7c

    • SSDEEP

      6144:GHFyN3U5hoSYEDtsUp0QiMKyIXF0tfaymknRvRo8//5SIbVVwCqy:GsNE5uotsCKyE09eknRvRoM5SuR

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks