General

  • Target

    7d8db13b60e52fa8f795d68381eb2317.exe

  • Size

    827KB

  • Sample

    241104-lvgqmsyfkk

  • MD5

    7d8db13b60e52fa8f795d68381eb2317

  • SHA1

    cf815f00bf53482199124c6fed99c487f85e1d6e

  • SHA256

    f0ac345cd615b9233b1436e380a0130863da5945f7a73a24877210a9ad4bc805

  • SHA512

    d41f783a057e022bce577b4f90e6f031b86ba459856a532f75fb2a2405c1c30c589afa945278fe30a6b7e2b6115b5aca7756a791556d1f82b959dc06c6435768

  • SSDEEP

    12288:i89kbsLqJ5RqavS3UCBe41kBEsIPtvz4OerNHcaMXb:w4LqJ5RqZ3UCBeYRbTexH8Xb

Score
10/10

Malware Config

Targets

    • Target

      7d8db13b60e52fa8f795d68381eb2317.exe

    • Size

      827KB

    • MD5

      7d8db13b60e52fa8f795d68381eb2317

    • SHA1

      cf815f00bf53482199124c6fed99c487f85e1d6e

    • SHA256

      f0ac345cd615b9233b1436e380a0130863da5945f7a73a24877210a9ad4bc805

    • SHA512

      d41f783a057e022bce577b4f90e6f031b86ba459856a532f75fb2a2405c1c30c589afa945278fe30a6b7e2b6115b5aca7756a791556d1f82b959dc06c6435768

    • SSDEEP

      12288:i89kbsLqJ5RqavS3UCBe41kBEsIPtvz4OerNHcaMXb:w4LqJ5RqZ3UCBeYRbTexH8Xb

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks