General

  • Target

    SolaraBostrappers.exe

  • Size

    1.5MB

  • Sample

    241115-2glenssqcw

  • MD5

    fb027065b10cd311473a1a7e5aa24005

  • SHA1

    91fec287f958e62ce18fc1342b7f33ebd35cf0be

  • SHA256

    4151805091b50f779143ce5b0782bbcfcbd9e471c81f6ab644f4e45dd064e2ec

  • SHA512

    e21f788281896c9363df1e0e34c6dc11b06aa9bd9c0d5d40bae5427b4f134bffe3a9cc546e0577159d0ba6f37ecba68c49d5bfde37eaf1b1beac36abc8cdaada

  • SSDEEP

    24576:U2G/nvxW3Ww0t2ciMa06q2YpE2yA/DFPxuBWBZCAO:UbA3021eyAbNMBWBch

Malware Config

Targets

    • Target

      SolaraBostrappers.exe

    • Size

      1.5MB

    • MD5

      fb027065b10cd311473a1a7e5aa24005

    • SHA1

      91fec287f958e62ce18fc1342b7f33ebd35cf0be

    • SHA256

      4151805091b50f779143ce5b0782bbcfcbd9e471c81f6ab644f4e45dd064e2ec

    • SHA512

      e21f788281896c9363df1e0e34c6dc11b06aa9bd9c0d5d40bae5427b4f134bffe3a9cc546e0577159d0ba6f37ecba68c49d5bfde37eaf1b1beac36abc8cdaada

    • SSDEEP

      24576:U2G/nvxW3Ww0t2ciMa06q2YpE2yA/DFPxuBWBZCAO:UbA3021eyAbNMBWBch

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks