General

  • Target

    da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59

  • Size

    829KB

  • Sample

    241203-degfyasmdn

  • MD5

    cbadabd5f33ef27c7859a83fc1a2c973

  • SHA1

    a155b4f7e2df225012b3f416ac13c2aab696f240

  • SHA256

    da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59

  • SHA512

    bf87a61b9a65f9c42d3bcf057ba08b328dffad7b50a49a34806a66585411849f4335336932fbfa88ec422995b394bbc4f4c326f6b9b0a4c0e28d8054057a8972

  • SSDEEP

    24576:/8snXXpIYvwMS2AKO99fP7NvujxVMzMx:/8s1vmvM

Score
10/10

Malware Config

Targets

    • Target

      da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59

    • Size

      829KB

    • MD5

      cbadabd5f33ef27c7859a83fc1a2c973

    • SHA1

      a155b4f7e2df225012b3f416ac13c2aab696f240

    • SHA256

      da044c033d375095443875b680b1de847b251d30e55e68fb8e3735c25286bb59

    • SHA512

      bf87a61b9a65f9c42d3bcf057ba08b328dffad7b50a49a34806a66585411849f4335336932fbfa88ec422995b394bbc4f4c326f6b9b0a4c0e28d8054057a8972

    • SSDEEP

      24576:/8snXXpIYvwMS2AKO99fP7NvujxVMzMx:/8s1vmvM

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks