General

  • Target

    39080b718b5fd386e181eae293d3dd8e.exe

  • Size

    829KB

  • Sample

    250116-t9ylpsyrfv

  • MD5

    39080b718b5fd386e181eae293d3dd8e

  • SHA1

    d08ff7cf2dd523b14453fc3a2403fc08adc8185e

  • SHA256

    eae062b9aa062793a84a0c5b60223aab93f29f995de6250720610ba248945162

  • SHA512

    11744429f505482bd88d17947ef192f468966b7d7b875ed67ae7a908313f300ef0bbf9cb326d526a169a93c23fa7417bb71a04bd9fa07d6bd5ef9e37f9987aff

  • SSDEEP

    12288:KowrLE6IKSq9aZxoHH6+LsHmRWR1httY5B2ycgPATuUc4wGOx:KoevIKSq9aZ46+LR2YeyPPUy4tOx

Score
10/10

Malware Config

Targets

    • Target

      39080b718b5fd386e181eae293d3dd8e.exe

    • Size

      829KB

    • MD5

      39080b718b5fd386e181eae293d3dd8e

    • SHA1

      d08ff7cf2dd523b14453fc3a2403fc08adc8185e

    • SHA256

      eae062b9aa062793a84a0c5b60223aab93f29f995de6250720610ba248945162

    • SHA512

      11744429f505482bd88d17947ef192f468966b7d7b875ed67ae7a908313f300ef0bbf9cb326d526a169a93c23fa7417bb71a04bd9fa07d6bd5ef9e37f9987aff

    • SSDEEP

      12288:KowrLE6IKSq9aZxoHH6+LsHmRWR1httY5B2ycgPATuUc4wGOx:KoevIKSq9aZ46+LR2YeyPPUy4tOx

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks