General

  • Target

    5c8bb6e672b99729898943e947d266b2f53f3514068cd89225741a80463c2edcN.exe

  • Size

    2.3MB

  • Sample

    250116-er876a1mds

  • MD5

    97fa326a760987d1c96801f65c705bb0

  • SHA1

    7024cfcb2f42320212f08fada83916189131717c

  • SHA256

    5c8bb6e672b99729898943e947d266b2f53f3514068cd89225741a80463c2edc

  • SHA512

    ad0a599a90f368c710349bec888a1a491ee59f5e3d5c8d6e2703691cb584f1fc9ca10a1dbc5c4cbd4c7e26c6779c48ad4104051f4fc1cad3d1691de04cc84aef

  • SSDEEP

    49152:P581k6pWQwY9zhWLCGUdeuGMvLq0jvYQxk:P58C6pgTEO0jvYQ

Score
10/10

Malware Config

Targets

    • Target

      5c8bb6e672b99729898943e947d266b2f53f3514068cd89225741a80463c2edcN.exe

    • Size

      2.3MB

    • MD5

      97fa326a760987d1c96801f65c705bb0

    • SHA1

      7024cfcb2f42320212f08fada83916189131717c

    • SHA256

      5c8bb6e672b99729898943e947d266b2f53f3514068cd89225741a80463c2edc

    • SHA512

      ad0a599a90f368c710349bec888a1a491ee59f5e3d5c8d6e2703691cb584f1fc9ca10a1dbc5c4cbd4c7e26c6779c48ad4104051f4fc1cad3d1691de04cc84aef

    • SSDEEP

      49152:P581k6pWQwY9zhWLCGUdeuGMvLq0jvYQxk:P58C6pgTEO0jvYQ

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks