General

  • Target

    ff3f337ba133257bf7ef80c83af6a374.bin

  • Size

    1.3MB

  • Sample

    241210-cd9weszjgz

  • MD5

    72ad15125dbbb5f2124ba00bf1d98507

  • SHA1

    ab72ca4bdf9d0047ba986dd488b6ee2420b83c76

  • SHA256

    5b2d9af4718697f083ff36fdf7e0cd69dee9467bd842a62153d7de28b586c6bd

  • SHA512

    6c4d2c9acfc201c8e104238f2f26b5dfa798b2817dd3c668b10a9717134293b686198d7baff0238f98fd10381138fa3cfb3c7bd0c79e87f19c94516cc46c9a52

  • SSDEEP

    24576:1Hojjr9jqDqhe+M5LsoG1XTpUjiok2jIF7zQuNSRitzN7HfW74c:1Hcf9jqL+M5If1X1UjtkHF77Ssc0c

Score
10/10

Malware Config

Targets

    • Target

      de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde.exe

    • Size

      1.7MB

    • MD5

      ff3f337ba133257bf7ef80c83af6a374

    • SHA1

      6c1746e5455bba5c362db11bf5aef0adaaea6337

    • SHA256

      de22374f782e1898ae2c015f41159b7485122a65ef26b0850e3c0609d41f2cde

    • SHA512

      f245180c0edbcd0836abc01e6660a95d698056109151e1451b8ce17c128aea1456c5cb3b23439645ef9dcc155a11801ee0d3ac6e334b66db191da98bb404a053

    • SSDEEP

      24576:LKoAZDIza+c3NunPWpnVuO2PJftX9fRQY16zIWJC5JUqR8lLr0I4gyid81sRO/F:LKdluO2P3N5QkWtlLr0ICNyO

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks