General

  • Target

    1182d9fec1b86ebb19739747de83243e.exe

  • Size

    1.3MB

  • Sample

    240708-kr54dsteke

  • MD5

    1182d9fec1b86ebb19739747de83243e

  • SHA1

    c187acb1a82c1e986b87cac0c34045fc4515a8f3

  • SHA256

    14d3c791fbdb14120500093e49fa25a23bd7e9fec3e8f7065e8df3a326359d22

  • SHA512

    fb9de8471b786844228f2c1c4d206f253767539347c999d2b7a37a9128eb2abd207e2f08a27afc853bdceee7bee4d92f7dec6d8db64c65d0d48fd3c014e4bb0b

  • SSDEEP

    24576:kT3VQMmrjL/KL7168n0y2jKPkO/SLAYKR3ToqmE/kD4thm2:c6/yLv2OPkO/RYGeEuohm

Score
10/10

Malware Config

Targets

    • Target

      1182d9fec1b86ebb19739747de83243e.exe

    • Size

      1.3MB

    • MD5

      1182d9fec1b86ebb19739747de83243e

    • SHA1

      c187acb1a82c1e986b87cac0c34045fc4515a8f3

    • SHA256

      14d3c791fbdb14120500093e49fa25a23bd7e9fec3e8f7065e8df3a326359d22

    • SHA512

      fb9de8471b786844228f2c1c4d206f253767539347c999d2b7a37a9128eb2abd207e2f08a27afc853bdceee7bee4d92f7dec6d8db64c65d0d48fd3c014e4bb0b

    • SSDEEP

      24576:kT3VQMmrjL/KL7168n0y2jKPkO/SLAYKR3ToqmE/kD4thm2:c6/yLv2OPkO/RYGeEuohm

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks