General

  • Target

    B4E04DE4587E063DB108E9EB85C7203C.exe

  • Size

    1.5MB

  • Sample

    240126-xw5dwadhen

  • MD5

    b4e04de4587e063db108e9eb85c7203c

  • SHA1

    f557073fe11b2cb1a41ad8336ef58bead962b80f

  • SHA256

    1bd1ae392a1cad614831e936fb8783abdcdbe7de3b39e069ae008670342b0854

  • SHA512

    2a6340c2ea662519b9a6cb75fb8188048232fea2ee0ad1b4107a19ae2473cec194923041e0c165a0cc0de4a22d4b6c4e6781f65f91b9b8a02946a91a6d9b43c2

  • SSDEEP

    24576:1ZX3kGr+WWpXwbTusB9cmbcgE+qhBXLM8y5f16ODj2+4w77QAO/gUm3FYrrZmXe:HnRr+/XB6G+sLQ1l9XUm3yxB

Score
10/10

Malware Config

Targets

    • Target

      B4E04DE4587E063DB108E9EB85C7203C.exe

    • Size

      1.5MB

    • MD5

      b4e04de4587e063db108e9eb85c7203c

    • SHA1

      f557073fe11b2cb1a41ad8336ef58bead962b80f

    • SHA256

      1bd1ae392a1cad614831e936fb8783abdcdbe7de3b39e069ae008670342b0854

    • SHA512

      2a6340c2ea662519b9a6cb75fb8188048232fea2ee0ad1b4107a19ae2473cec194923041e0c165a0cc0de4a22d4b6c4e6781f65f91b9b8a02946a91a6d9b43c2

    • SSDEEP

      24576:1ZX3kGr+WWpXwbTusB9cmbcgE+qhBXLM8y5f16ODj2+4w77QAO/gUm3FYrrZmXe:HnRr+/XB6G+sLQ1l9XUm3yxB

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks