General

  • Target

    ed4e123b6451095714644fcf1367ba60.bin

  • Size

    1.1MB

  • Sample

    231118-d5x7daac43

  • MD5

    ed4e123b6451095714644fcf1367ba60

  • SHA1

    12a24314c6d55271d040f3a62703f6669ef51b61

  • SHA256

    b957c6d107b4f671a489452761f99ce7ad7396e88f2d3f54310b44a39c87e9f7

  • SHA512

    a26e311a29ac440f8339a97ae825a7afd4368afd02f258d2865c5a8690e27619470d09a083d8309655c441f292c681510a3b79aa5802846fd8a83acf54d698c5

  • SSDEEP

    24576:6ADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:cE86MVX/SwHmf

Score
10/10

Malware Config

Targets

    • Target

      ed4e123b6451095714644fcf1367ba60.bin

    • Size

      1.1MB

    • MD5

      ed4e123b6451095714644fcf1367ba60

    • SHA1

      12a24314c6d55271d040f3a62703f6669ef51b61

    • SHA256

      b957c6d107b4f671a489452761f99ce7ad7396e88f2d3f54310b44a39c87e9f7

    • SHA512

      a26e311a29ac440f8339a97ae825a7afd4368afd02f258d2865c5a8690e27619470d09a083d8309655c441f292c681510a3b79aa5802846fd8a83acf54d698c5

    • SSDEEP

      24576:6ADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:cE86MVX/SwHmf

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks