General

  • Target

    47cabe63424ef65665ce7f0137f6fcf3.exe

  • Size

    828KB

  • Sample

    240726-pr1acsxgnr

  • MD5

    47cabe63424ef65665ce7f0137f6fcf3

  • SHA1

    cf85c975972f3e0959ab37575c171a0d194377d4

  • SHA256

    0b37afa009e708ad8afad3ba00f5d7cd04e4befc807981922f6170cf4705080a

  • SHA512

    5596d71c927f6f6203415ecec2e22a4a2bd2d2c4866bcb7372da55412cca891ed7bd823b1b9d6a03260177826f4565117c8746ea4277c6fdab2c4e6fd3f54dc8

  • SSDEEP

    12288:qmxaXeD4VOwMacVHgZKMh3ZcO2iPfsgMMUO0R:SeD4VYVAZzH16

Score
10/10

Malware Config

Targets

    • Target

      47cabe63424ef65665ce7f0137f6fcf3.exe

    • Size

      828KB

    • MD5

      47cabe63424ef65665ce7f0137f6fcf3

    • SHA1

      cf85c975972f3e0959ab37575c171a0d194377d4

    • SHA256

      0b37afa009e708ad8afad3ba00f5d7cd04e4befc807981922f6170cf4705080a

    • SHA512

      5596d71c927f6f6203415ecec2e22a4a2bd2d2c4866bcb7372da55412cca891ed7bd823b1b9d6a03260177826f4565117c8746ea4277c6fdab2c4e6fd3f54dc8

    • SSDEEP

      12288:qmxaXeD4VOwMacVHgZKMh3ZcO2iPfsgMMUO0R:SeD4VYVAZzH16

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks