Resubmissions

25-04-2024 19:50

240425-yj9cqsdh9v 10

25-04-2024 16:49

240425-vb54kach52 10

General

  • Target

    titan r6 menu.exe

  • Size

    1.1MB

  • Sample

    240425-vb54kach52

  • MD5

    8e1b02dff0d5c9795b793c934653cc14

  • SHA1

    58307ca9ce46c92e040596991235c55fbb405eb0

  • SHA256

    e4fdd469b3d3d59dfa28feb9472b6a8c0318a669aa0467ae4d8eccd6f0168b85

  • SHA512

    b92c2db8b1cfd92fc06d000fad5e1b0b28108a62b86b19702ecd0478344de8ae2a1f731b8dd5b8827e8ea548c5a82e7ecbac1a2b53a57a2383a76f7647035c88

  • SSDEEP

    24576:U2G/nvxW3Ww0t+Q4m1dodoKY2dcbxnw+Zj5:UbA30D4mEXOt

Score
10/10

Malware Config

Targets

    • Target

      titan r6 menu.exe

    • Size

      1.1MB

    • MD5

      8e1b02dff0d5c9795b793c934653cc14

    • SHA1

      58307ca9ce46c92e040596991235c55fbb405eb0

    • SHA256

      e4fdd469b3d3d59dfa28feb9472b6a8c0318a669aa0467ae4d8eccd6f0168b85

    • SHA512

      b92c2db8b1cfd92fc06d000fad5e1b0b28108a62b86b19702ecd0478344de8ae2a1f731b8dd5b8827e8ea548c5a82e7ecbac1a2b53a57a2383a76f7647035c88

    • SSDEEP

      24576:U2G/nvxW3Ww0t+Q4m1dodoKY2dcbxnw+Zj5:UbA30D4mEXOt

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks