General

  • Target

    SolaraBootstrapper.exe

  • Size

    1.6MB

  • Sample

    240613-2rl4ystelh

  • MD5

    7297d802ad13ac028a534f89a5679a3d

  • SHA1

    149167017f675ae16dd3e21c51079bda2de4aa8e

  • SHA256

    1c97f66f0f6bfe19424faed1cb146aa0b0b09867ffc0a716ff786869a56ab460

  • SHA512

    e85b0add13a0e0548b7c17947c57833034bb8d744630c6522679255ecae3d899c543051f286fe92cfad14212d2c47a779cbabe71a885249751c6872e5f540d94

  • SSDEEP

    24576:QJ/drgNrsiYEhAppiMV+sDM3ox6YO6m1L4YYBzZv9zr7gjw7iXFzsixjO19R45kw:OryEEsQvYOZ1L+ZvRgjdXrxjOXGAM5

Score
10/10

Malware Config

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      1.6MB

    • MD5

      7297d802ad13ac028a534f89a5679a3d

    • SHA1

      149167017f675ae16dd3e21c51079bda2de4aa8e

    • SHA256

      1c97f66f0f6bfe19424faed1cb146aa0b0b09867ffc0a716ff786869a56ab460

    • SHA512

      e85b0add13a0e0548b7c17947c57833034bb8d744630c6522679255ecae3d899c543051f286fe92cfad14212d2c47a779cbabe71a885249751c6872e5f540d94

    • SSDEEP

      24576:QJ/drgNrsiYEhAppiMV+sDM3ox6YO6m1L4YYBzZv9zr7gjw7iXFzsixjO19R45kw:OryEEsQvYOZ1L+ZvRgjdXrxjOXGAM5

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks