General

  • Target

    a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6

  • Size

    827KB

  • Sample

    250206-degrpszqcs

  • MD5

    23d0dbe545edf5e3f6d5f89306091acb

  • SHA1

    d2aa733c6e5bcfd64030c810014c09e52eb64474

  • SHA256

    a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6

  • SHA512

    65e3f360ccf29130b709ca6ba06f7809578bd860e7bc12da1631467899db017feeaf92fa804c797ccbcaa96c97ed7911a1e7021a8c5df84779e66caa8bf8f69a

  • SSDEEP

    12288:THO6O1v7cpNWrqV908Etd+U4UCrw3EO9VENXJMV5SEZd0ju:b0v7cpXVe8EtwUtD3ET6SEZR

Score
10/10

Malware Config

Targets

    • Target

      a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6

    • Size

      827KB

    • MD5

      23d0dbe545edf5e3f6d5f89306091acb

    • SHA1

      d2aa733c6e5bcfd64030c810014c09e52eb64474

    • SHA256

      a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6

    • SHA512

      65e3f360ccf29130b709ca6ba06f7809578bd860e7bc12da1631467899db017feeaf92fa804c797ccbcaa96c97ed7911a1e7021a8c5df84779e66caa8bf8f69a

    • SSDEEP

      12288:THO6O1v7cpNWrqV908Etd+U4UCrw3EO9VENXJMV5SEZd0ju:b0v7cpXVe8EtwUtD3ET6SEZR

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks