General

  • Target

    FatalityCrack.rar

  • Size

    5.2MB

  • Sample

    250206-kcmcqs1pfk

  • MD5

    b77dc498ed6f44f61ece97fdb80111ce

  • SHA1

    3bb9c1624119a593e26011af95550879318b5ca0

  • SHA256

    691fc2c5c9b9effa163ffbd49bc9a8be1df6b0e6f8a792bedd4e418da3124d84

  • SHA512

    d6eb30d15ee16a48778ec7cabd43b2a64131d1d5227766effab7b4df2b4b6049be0d296ba10ba6e5ff62568b25e4720f6f01965ceef545141711102759c03283

  • SSDEEP

    98304:xi6h7ncSYv4+CSBI+PGfTh/MrOSoegHy4ror0Low9q8PQk/9sZbSEkTYQ49iY/e:oOnct9C8IIqThqOsQy4krNw9q8bAWTYc

Malware Config

Targets

    • Target

      FatalityCrack.rar

    • Size

      5.2MB

    • MD5

      b77dc498ed6f44f61ece97fdb80111ce

    • SHA1

      3bb9c1624119a593e26011af95550879318b5ca0

    • SHA256

      691fc2c5c9b9effa163ffbd49bc9a8be1df6b0e6f8a792bedd4e418da3124d84

    • SHA512

      d6eb30d15ee16a48778ec7cabd43b2a64131d1d5227766effab7b4df2b4b6049be0d296ba10ba6e5ff62568b25e4720f6f01965ceef545141711102759c03283

    • SSDEEP

      98304:xi6h7ncSYv4+CSBI+PGfTh/MrOSoegHy4ror0Low9q8PQk/9sZbSEkTYQ49iY/e:oOnct9C8IIqThqOsQy4krNw9q8bAWTYc

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks