General

  • Target

    1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe

  • Size

    828KB

  • Sample

    250127-ehel7a1jck

  • MD5

    46ab1dde1bac98a34cb41166f659db27

  • SHA1

    f12b50ad32d9290d977322c7fb9594ac54d7b64a

  • SHA256

    1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19

  • SHA512

    4890f12e5fbd6f928936ccc2e2cd67414e339d4f2058b84a5cee73ad7600bc2dc5bf0368581781c047620abfa4df9e3fddcb9185f88222d574d6503f67d897b9

  • SSDEEP

    12288:gF+JPdVQB7gH+F44vYVYJ21H3z2oLtubNUPX08fab:gFcVU7gG44vYVH1H/obyCb

Score
10/10

Malware Config

Targets

    • Target

      1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19.exe

    • Size

      828KB

    • MD5

      46ab1dde1bac98a34cb41166f659db27

    • SHA1

      f12b50ad32d9290d977322c7fb9594ac54d7b64a

    • SHA256

      1c281aad64e57aed57f78a3a35797381309c161e89e70a6803f3ec166fb29c19

    • SHA512

      4890f12e5fbd6f928936ccc2e2cd67414e339d4f2058b84a5cee73ad7600bc2dc5bf0368581781c047620abfa4df9e3fddcb9185f88222d574d6503f67d897b9

    • SSDEEP

      12288:gF+JPdVQB7gH+F44vYVYJ21H3z2oLtubNUPX08fab:gFcVU7gG44vYVH1H/obyCb

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks