General

  • Target

    d6f4814f6bf4d7cbe9cc70904df3e9ca02c189576883f35eb6e19ab193508e32

  • Size

    415KB

  • Sample

    240417-rbe1laah43

  • MD5

    5d1016e92807a0396206e9ba9483728b

  • SHA1

    8401738fe5b09145aad5c970d15a0f0f0706597b

  • SHA256

    d6f4814f6bf4d7cbe9cc70904df3e9ca02c189576883f35eb6e19ab193508e32

  • SHA512

    cc8beab05e418fd15cfd581133e538e92e00c96e4c2e10492fa65081b02a78c4b9e0c64cebb1b22f246fb387a8b81b6a935341db5dd4b365d9ec0bfc18538942

  • SSDEEP

    12288:S+SYlpBLNx19l4ngoz7MdopamzPdq0EVEd:AYl3pr9MgmMupbzo0EVEd

Score
10/10

Malware Config

Targets

    • Target

      5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70.exe

    • Size

      828KB

    • MD5

      125ef93b1d3162aede8c49768d1c9007

    • SHA1

      9f6fa10e4c480aa1032eadb3d8f3b795f43e0f8d

    • SHA256

      5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70

    • SHA512

      432f424544d3e2c87c4855c2d35a99009948534b3a1a81845cdbfca22b3ffb1686692688c307b0803c45acbe17bef849724019c541e204dac22a74405a9bc788

    • SSDEEP

      12288:vsrUaYHLogEUDklbcUG8TlMvZKjFZO1BgeqfUyojUxVd4Rr+7PNB:GgEUAbBQKjrSJq8yojUiRrGNB

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks