General

  • Target

    4f0a0a77c8473028b724fcd4431a5128.exe

  • Size

    2.6MB

  • Sample

    240417-en8gfsdc63

  • MD5

    4f0a0a77c8473028b724fcd4431a5128

  • SHA1

    af1705bf6b02cb0ccc703ebaa55c4ea8c07cb968

  • SHA256

    7c0217b4f09d7b5eb5a087c45aed6d13fca45ec3be6e32df510a9ad9a71d6c1a

  • SHA512

    cc11e25588c72f9fed049c8b082dbe13a945b988b397ce9762b486b5c0da1cb1a2c93b5af441a13f3790556b35ccb20e4b9a750d8cb387c88a6934ea9243ef68

  • SSDEEP

    49152:OUK2oQKwtABwKO+0QIvoY3jFx3KNQ8qd28ZaQcULQ45i+PynH4L:OaoQXKfNNYzbaNEdZSeTynY

Score
10/10

Malware Config

Targets

    • Target

      4f0a0a77c8473028b724fcd4431a5128.exe

    • Size

      2.6MB

    • MD5

      4f0a0a77c8473028b724fcd4431a5128

    • SHA1

      af1705bf6b02cb0ccc703ebaa55c4ea8c07cb968

    • SHA256

      7c0217b4f09d7b5eb5a087c45aed6d13fca45ec3be6e32df510a9ad9a71d6c1a

    • SHA512

      cc11e25588c72f9fed049c8b082dbe13a945b988b397ce9762b486b5c0da1cb1a2c93b5af441a13f3790556b35ccb20e4b9a750d8cb387c88a6934ea9243ef68

    • SSDEEP

      49152:OUK2oQKwtABwKO+0QIvoY3jFx3KNQ8qd28ZaQcULQ45i+PynH4L:OaoQXKfNNYzbaNEdZSeTynY

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks