General

  • Target

    080dea74b4e8c480a3dc1be07c13eeeb

  • Size

    1.4MB

  • Sample

    231230-afqt8agfb4

  • MD5

    080dea74b4e8c480a3dc1be07c13eeeb

  • SHA1

    7ec15f32916c21efd92db1f52b1edc9c4e81df35

  • SHA256

    f28cc0f1f1a0408490a39ab982477aa19dc7b199c599e9f9a89e62f2f423a24d

  • SHA512

    52fe5f40fe8b46b17441c913e2abeedc597d9a8e5ebdfb7322ac5050785d9e8e69cc38b0a64b2e42d495f929ea49497427f719d6bcaf16b6ba5183f3d81af91e

  • SSDEEP

    24576:wUesxbPoSf/0W4vVo6m+p2EFV0/hkAGmo+M5AMGlVrfelPMEeA6yy+4:pJ0W4vANaPmbM9wFeplZ7F

Malware Config

Targets

    • Target

      080dea74b4e8c480a3dc1be07c13eeeb

    • Size

      1.4MB

    • MD5

      080dea74b4e8c480a3dc1be07c13eeeb

    • SHA1

      7ec15f32916c21efd92db1f52b1edc9c4e81df35

    • SHA256

      f28cc0f1f1a0408490a39ab982477aa19dc7b199c599e9f9a89e62f2f423a24d

    • SHA512

      52fe5f40fe8b46b17441c913e2abeedc597d9a8e5ebdfb7322ac5050785d9e8e69cc38b0a64b2e42d495f929ea49497427f719d6bcaf16b6ba5183f3d81af91e

    • SSDEEP

      24576:wUesxbPoSf/0W4vVo6m+p2EFV0/hkAGmo+M5AMGlVrfelPMEeA6yy+4:pJ0W4vANaPmbM9wFeplZ7F

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks