General

  • Target

    2025-05-20_eafd537e09d19051f38e8431e903a01c_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer

  • Size

    2.1MB

  • Sample

    250520-flnvpsvjw8

  • MD5

    eafd537e09d19051f38e8431e903a01c

  • SHA1

    d72df0774070e1e9986da629dd9f9a90235fb8e0

  • SHA256

    edd33db8fca2389a9bbaa05c29034ff30eafec51134e357db3ad9bdf0c71700e

  • SHA512

    b85b8b48129f2c9fe06828d02513fef4164f404ac87cbd106cbcb0ecc0a4e0de7e3b5e1d112e027a07cddc693edb56a8d0bb394d327edf68bbbf60a60afdb573

  • SSDEEP

    49152:IBJYME2fPRE+fohPTbryP5sKGdxF8614Cymdt5:ySM9P++wpH45nGLF8614UP5

Malware Config

Targets

    • Target

      2025-05-20_eafd537e09d19051f38e8431e903a01c_amadey_black-basta_cova_cryptbot_dcrat_elex_luca-stealer

    • Size

      2.1MB

    • MD5

      eafd537e09d19051f38e8431e903a01c

    • SHA1

      d72df0774070e1e9986da629dd9f9a90235fb8e0

    • SHA256

      edd33db8fca2389a9bbaa05c29034ff30eafec51134e357db3ad9bdf0c71700e

    • SHA512

      b85b8b48129f2c9fe06828d02513fef4164f404ac87cbd106cbcb0ecc0a4e0de7e3b5e1d112e027a07cddc693edb56a8d0bb394d327edf68bbbf60a60afdb573

    • SSDEEP

      49152:IBJYME2fPRE+fohPTbryP5sKGdxF8614Cymdt5:ySM9P++wpH45nGLF8614UP5

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »