General

  • Target

    88F34405800FD589303DD080CB702BF0.exe

  • Size

    2.7MB

  • Sample

    241211-kxw3nszphj

  • MD5

    88f34405800fd589303dd080cb702bf0

  • SHA1

    ff0464ed91e346e4a28c66e46b521916daacb839

  • SHA256

    3490a06a34fbdc0f9d3ae55ff159fe407bf962f67b56bde78a9ad0bb312a1610

  • SHA512

    430178b4579e748fb0581090d1a96e3acd234b4d4575a0914f9e083b64ede5351fe929413100b05fa298a4172305ec8cb79c82a53acd849365e165195d1c4765

  • SSDEEP

    49152:kJloZITX1N8fHQxECPA8Wpd9MNZesZb6EIAZwgZILA:kJloSTX1yPQxv0tMNIC6K1Kk

Score
10/10

Malware Config

Targets

    • Target

      88F34405800FD589303DD080CB702BF0.exe

    • Size

      2.7MB

    • MD5

      88f34405800fd589303dd080cb702bf0

    • SHA1

      ff0464ed91e346e4a28c66e46b521916daacb839

    • SHA256

      3490a06a34fbdc0f9d3ae55ff159fe407bf962f67b56bde78a9ad0bb312a1610

    • SHA512

      430178b4579e748fb0581090d1a96e3acd234b4d4575a0914f9e083b64ede5351fe929413100b05fa298a4172305ec8cb79c82a53acd849365e165195d1c4765

    • SSDEEP

      49152:kJloZITX1N8fHQxECPA8Wpd9MNZesZb6EIAZwgZILA:kJloSTX1yPQxv0tMNIC6K1Kk

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks