General

  • Target

    d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe

  • Size

    2.3MB

  • Sample

    250107-tmxqwsznep

  • MD5

    465c263dd263abe9b54f1514ae40f005

  • SHA1

    55b176f6b878e38f809c63b15408c5f76438398a

  • SHA256

    d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8125d1274046b69b7dae

  • SHA512

    c15e107b267aad8e17acb275ac6eda8b829ed5aa9b3c451cb8810b7e993b674acf2821337482424adec25d366e37c6708dd14bfa7876ffca1faa28a1fdbbd2f2

  • SSDEEP

    49152:cXyFqpEX5DJ+8WLlEPeZUaPSzes33Ll4EPx79QCKZLwV6:ACqpmX+plEPys37bRQ

Score
10/10

Malware Config

Targets

    • Target

      d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8.exe

    • Size

      2.3MB

    • MD5

      465c263dd263abe9b54f1514ae40f005

    • SHA1

      55b176f6b878e38f809c63b15408c5f76438398a

    • SHA256

      d39e417bda2e1e9b7f79fa8e974fdc6e06e82d3969eb8125d1274046b69b7dae

    • SHA512

      c15e107b267aad8e17acb275ac6eda8b829ed5aa9b3c451cb8810b7e993b674acf2821337482424adec25d366e37c6708dd14bfa7876ffca1faa28a1fdbbd2f2

    • SSDEEP

      49152:cXyFqpEX5DJ+8WLlEPeZUaPSzes33Ll4EPx79QCKZLwV6:ACqpmX+plEPys37bRQ

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks