General

  • Target

    a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6.zip

  • Size

    415KB

  • Sample

    250207-lvhypsxja1

  • MD5

    ac710165e91fc2593b389369855bd983

  • SHA1

    f56cef636ff1a810241cc63c46c709309bf73074

  • SHA256

    0e9dcb9b0b8faea9bede2025874aebd0fe9edbbe8296ce6fde1acd6507f28f96

  • SHA512

    b61ff79d9bccdaec4c0e9e1e60be5cc4b808a20dcc9dee893979e0d53fcf34920d2a42e276908fe8d3ab1430d399cff59659dc7e9577c9e0850cd513cddbe6e6

  • SSDEEP

    12288:ahJdm4VjWi9u0sikDTexaSAFsMjag4ff2Llm:Eiyyi9JsikD6gSAqMjD4ff2Bm

Score
10/10

Malware Config

Targets

    • Target

      a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6.exe

    • Size

      827KB

    • MD5

      23d0dbe545edf5e3f6d5f89306091acb

    • SHA1

      d2aa733c6e5bcfd64030c810014c09e52eb64474

    • SHA256

      a2bf0fc5a323073723c337d9a90e5141bd2ff9ad0b3f70459ee695962f87f8e6

    • SHA512

      65e3f360ccf29130b709ca6ba06f7809578bd860e7bc12da1631467899db017feeaf92fa804c797ccbcaa96c97ed7911a1e7021a8c5df84779e66caa8bf8f69a

    • SSDEEP

      12288:THO6O1v7cpNWrqV908Etd+U4UCrw3EO9VENXJMV5SEZd0ju:b0v7cpXVe8EtwUtD3ET6SEZR

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks