General

  • Target

    3a1b3746d26413c8668fb533ab612284.exe

  • Size

    827KB

  • Sample

    240515-yx89wshf9x

  • MD5

    3a1b3746d26413c8668fb533ab612284

  • SHA1

    875d159c892558473519f947c0421672717f7e2c

  • SHA256

    0d57ce22e6ce4c0c232e21fbfab3ebde73d0a2f0f210602ece8d066d37e57924

  • SHA512

    26f20ae889e6a327d6cd710082c0a2ccf4e94a6cc90bd8b3916f7b28a00e7f7c23448c7dfc817242b48e80468779b815133db64a7a4b7b77dc8729a940e5a8fe

  • SSDEEP

    12288:DqUgxxQIWHTZu9PBjhP/i4TuI+sqBcDOC6hThC/8bMCHZR:uZQ9HTZu9lN/i4qI+sq6+nNj

Score
10/10

Malware Config

Targets

    • Target

      3a1b3746d26413c8668fb533ab612284.exe

    • Size

      827KB

    • MD5

      3a1b3746d26413c8668fb533ab612284

    • SHA1

      875d159c892558473519f947c0421672717f7e2c

    • SHA256

      0d57ce22e6ce4c0c232e21fbfab3ebde73d0a2f0f210602ece8d066d37e57924

    • SHA512

      26f20ae889e6a327d6cd710082c0a2ccf4e94a6cc90bd8b3916f7b28a00e7f7c23448c7dfc817242b48e80468779b815133db64a7a4b7b77dc8729a940e5a8fe

    • SSDEEP

      12288:DqUgxxQIWHTZu9PBjhP/i4TuI+sqBcDOC6hThC/8bMCHZR:uZQ9HTZu9lN/i4qI+sq6+nNj

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks