General

  • Target

    2600cbb9ad38c10aca6ac4a91900cc84.bin

  • Size

    2.1MB

  • Sample

    240425-bng3qacf93

  • MD5

    8d0c27f443521d0ebbbdc8a804166d37

  • SHA1

    9ee5a600d4193067b89907de1628e6143649f026

  • SHA256

    3c5af308bf4ddad79422caea4295d14ae2e5628a600ac7ddcc2a77a0a070d207

  • SHA512

    f16822fa479cdeecb6beab8e86ba9804583357ea5e6fa38a1e7c55bec1b2c6b16003eb96588382059da3a091ce619b5e80379513091d8851e95e8c4b2c6f23d7

  • SSDEEP

    49152:ofDcpR05AzEiBtjvacCPYaTnQ+V8seKDzsdHa:orcTmAzhBt+cyTQcBeyzqa

Score
10/10

Malware Config

Targets

    • Target

      e62d890d90cb121e7fb678dea021786d5558ba433bc1499580b3e327bc85e847.exe

    • Size

      3.0MB

    • MD5

      2600cbb9ad38c10aca6ac4a91900cc84

    • SHA1

      f670e02edea5048e57c089ae4042f1f00a5790f0

    • SHA256

      e62d890d90cb121e7fb678dea021786d5558ba433bc1499580b3e327bc85e847

    • SHA512

      06da17684e3d84105b9872d1b74af780d0ffcbf80c2e2aae08ecde9c7991372feb4498594ec62468049e739ec71c11ddc3bf3aa05ea1875178e235441819a00b

    • SSDEEP

      49152:0f2OK9jJIoFe/S7zrfL3pmRk/5JaANZr/LHFTYUjy3/q3KgW:19jlw8rfjpmRc3/ZvlTtjVj

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks