General

  • Target

    50887c3ed5676401f9cab09d742bbce4.exe

  • Size

    827KB

  • Sample

    250109-z93tbatmhm

  • MD5

    50887c3ed5676401f9cab09d742bbce4

  • SHA1

    1e4016e50cffe51614df5a31817d50de7b85af26

  • SHA256

    a22e4b92ef53c22a69ef02fa17403fcdf74d3c4b3efc8d28604040286f4cdedf

  • SHA512

    bd8ec53d02ba47c8656c4260d2112f50755526898b681d1affbd50a6bdda69f01fa78d091ff812d3a25454afd03eca815fea7b869f037b4f492b1d188f376ab2

  • SSDEEP

    12288:2NultHBphsl8LvoS8wXO0DzXLYFlTvyk31:ZHBp+ovohwDeTv131

Score
10/10

Malware Config

Targets

    • Target

      50887c3ed5676401f9cab09d742bbce4.exe

    • Size

      827KB

    • MD5

      50887c3ed5676401f9cab09d742bbce4

    • SHA1

      1e4016e50cffe51614df5a31817d50de7b85af26

    • SHA256

      a22e4b92ef53c22a69ef02fa17403fcdf74d3c4b3efc8d28604040286f4cdedf

    • SHA512

      bd8ec53d02ba47c8656c4260d2112f50755526898b681d1affbd50a6bdda69f01fa78d091ff812d3a25454afd03eca815fea7b869f037b4f492b1d188f376ab2

    • SSDEEP

      12288:2NultHBphsl8LvoS8wXO0DzXLYFlTvyk31:ZHBp+ovohwDeTv131

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks