General

  • Target

    d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020beN

  • Size

    1.5MB

  • Sample

    241110-ljbp9axlfm

  • MD5

    f98b8d957e56a925bdfe1a9ed6182860

  • SHA1

    c30bd13e13837e96f0affe38dc3603d978c20d91

  • SHA256

    d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020be

  • SHA512

    7766fe75347bca80d4754f1e7eebdafb134de91491e94f951b5a22ae27a62d7015f5c6c326aeb6ab65cd8f176e4f8ba355f11751b4685c5c1d60765526ed6111

  • SSDEEP

    24576:ceaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:ceaj9bHmMbkBHVdGE1Sy/ujhaIh+1

Score
10/10

Malware Config

Targets

    • Target

      d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020beN

    • Size

      1.5MB

    • MD5

      f98b8d957e56a925bdfe1a9ed6182860

    • SHA1

      c30bd13e13837e96f0affe38dc3603d978c20d91

    • SHA256

      d4a31dc5744b566f097f20ee18f55acedec23a55117c88e3cca8d65d8f4020be

    • SHA512

      7766fe75347bca80d4754f1e7eebdafb134de91491e94f951b5a22ae27a62d7015f5c6c326aeb6ab65cd8f176e4f8ba355f11751b4685c5c1d60765526ed6111

    • SSDEEP

      24576:ceaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13:ceaj9bHmMbkBHVdGE1Sy/ujhaIh+1

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks