General

  • Target

    2e8356dfe51bd0a98aadcbd170a6d777.exe

  • Size

    1.2MB

  • Sample

    231205-b47cjsgh63

  • MD5

    2e8356dfe51bd0a98aadcbd170a6d777

  • SHA1

    4bd29d52517f4b14433ca5e911e277123968dbfb

  • SHA256

    e4ae89fae552ad33c4e25a0feb8f8547254f27c197e51c183ee16edae898f6c8

  • SHA512

    2615a8c39079d57e70dcae1c0f180e4a6d292348c28d8c094f9b1312bfbd74f02e40bada740faadd563c061067f99dde00de32d71d261b1424ed1ef8ce0926ef

  • SSDEEP

    24576:N3sTOPjpOgaRtddWpNs1e9fvz+iPRdz5nk86:OTScbRcp1nl

Score
10/10

Malware Config

Targets

    • Target

      2e8356dfe51bd0a98aadcbd170a6d777.exe

    • Size

      1.2MB

    • MD5

      2e8356dfe51bd0a98aadcbd170a6d777

    • SHA1

      4bd29d52517f4b14433ca5e911e277123968dbfb

    • SHA256

      e4ae89fae552ad33c4e25a0feb8f8547254f27c197e51c183ee16edae898f6c8

    • SHA512

      2615a8c39079d57e70dcae1c0f180e4a6d292348c28d8c094f9b1312bfbd74f02e40bada740faadd563c061067f99dde00de32d71d261b1424ed1ef8ce0926ef

    • SSDEEP

      24576:N3sTOPjpOgaRtddWpNs1e9fvz+iPRdz5nk86:OTScbRcp1nl

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks