General

  • Target

    d9e0f300d171bc4c1eae1e04bc3411f86cbb616b1e98271c845ad35b81e8c240

  • Size

    415KB

  • Sample

    240417-rbg5ysah45

  • MD5

    be61c522413ec7b21c40fd0aea35fc91

  • SHA1

    e40523c0fbaba4eb42bb043f97836a0cfaa15c4f

  • SHA256

    d9e0f300d171bc4c1eae1e04bc3411f86cbb616b1e98271c845ad35b81e8c240

  • SHA512

    52f56a77339d13a1d6b21881a52d5aed9c1aa89b2daaeffa8fef828cbad5902171d8a4259e4483e6fc08e4d746109e9d30fcecfc9cd88ec89bd7d2f04253fd90

  • SSDEEP

    12288:nkI490t5LVDzL3LD1Rt45rIn8gh+dBrUmA:nkI490H5L3LD1RtsO5hIBrUmA

Score
10/10

Malware Config

Targets

    • Target

      5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70.exe

    • Size

      828KB

    • MD5

      125ef93b1d3162aede8c49768d1c9007

    • SHA1

      9f6fa10e4c480aa1032eadb3d8f3b795f43e0f8d

    • SHA256

      5de166439e50ddf65e251538313e9dc29eab58929e6735d70385615f7fcf4f70

    • SHA512

      432f424544d3e2c87c4855c2d35a99009948534b3a1a81845cdbfca22b3ffb1686692688c307b0803c45acbe17bef849724019c541e204dac22a74405a9bc788

    • SSDEEP

      12288:vsrUaYHLogEUDklbcUG8TlMvZKjFZO1BgeqfUyojUxVd4Rr+7PNB:GgEUAbBQKjrSJq8yojUiRrGNB

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks