General

  • Target

    containerServerperf.exe

  • Size

    828KB

  • Sample

    241223-jbg6ysxnfl

  • MD5

    ddce5f6cd47da319bbd8141d3a0fa618

  • SHA1

    4b3bafd730ebc70dcc1441fca2c21b81fab9ea03

  • SHA256

    fe48d8776f5c31ba36162463e3a5a89378ef4a177c6d9cf74750ff469b5de3d3

  • SHA512

    05e82ea24d54336cd33bb297967c8eb773389ded37401041739152ff5ad212fbc2d2a6660b27277517071b89c02ab8fb3859d9bc03add1f91ea86eb516a18d59

  • SSDEEP

    12288:nc79Njwwi1Zn7YnnDh47SqeJazwiXbAxQhcMBmXq3dq:nWTwXPnIh3qeJaEKl1tq

Score
10/10

Malware Config

Targets

    • Target

      containerServerperf.exe

    • Size

      828KB

    • MD5

      ddce5f6cd47da319bbd8141d3a0fa618

    • SHA1

      4b3bafd730ebc70dcc1441fca2c21b81fab9ea03

    • SHA256

      fe48d8776f5c31ba36162463e3a5a89378ef4a177c6d9cf74750ff469b5de3d3

    • SHA512

      05e82ea24d54336cd33bb297967c8eb773389ded37401041739152ff5ad212fbc2d2a6660b27277517071b89c02ab8fb3859d9bc03add1f91ea86eb516a18d59

    • SSDEEP

      12288:nc79Njwwi1Zn7YnnDh47SqeJazwiXbAxQhcMBmXq3dq:nWTwXPnIh3qeJaEKl1tq

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks