General

  • Target

    3e6f4e16f8da924256118e6c9cdaa7f2.exe

  • Size

    1.2MB

  • Sample

    250126-adq27swrak

  • MD5

    3e6f4e16f8da924256118e6c9cdaa7f2

  • SHA1

    87b7927fb99d36a91b09ee9fa3807ef418a960b8

  • SHA256

    8c3a7033ee06a047f453f22368007970407fdd15e73bca372c72f70cfb89b4ab

  • SHA512

    b3df11ec860740a4ea874177cb222df715cc424b55df5454213c5b6a3ff6fb1d30e9bc9fd207afdeaff0e41961c694f915535c1fd64ab32d1066f5337193a69d

  • SSDEEP

    24576:bmYejVvCekg5dxjMlM/R3DxnI2IbqvXTsb8:bmF4g9IUIN2r

Score
10/10

Malware Config

Targets

    • Target

      3e6f4e16f8da924256118e6c9cdaa7f2.exe

    • Size

      1.2MB

    • MD5

      3e6f4e16f8da924256118e6c9cdaa7f2

    • SHA1

      87b7927fb99d36a91b09ee9fa3807ef418a960b8

    • SHA256

      8c3a7033ee06a047f453f22368007970407fdd15e73bca372c72f70cfb89b4ab

    • SHA512

      b3df11ec860740a4ea874177cb222df715cc424b55df5454213c5b6a3ff6fb1d30e9bc9fd207afdeaff0e41961c694f915535c1fd64ab32d1066f5337193a69d

    • SSDEEP

      24576:bmYejVvCekg5dxjMlM/R3DxnI2IbqvXTsb8:bmF4g9IUIN2r

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks