General

  • Target

    64a3eb8cd682bfb669a8046566e332a109dbaa285b2af073a8b36c9b2315f94b

  • Size

    1.3MB

  • Sample

    221031-2qx5tsegfm

  • MD5

    8b38c64bb8923bd7f1d3c8d6b29205a8

  • SHA1

    72b526110c82ab457d01bdddc658c8767575a60a

  • SHA256

    64a3eb8cd682bfb669a8046566e332a109dbaa285b2af073a8b36c9b2315f94b

  • SHA512

    edb7bbcc488b17d25e34a2cfd2c79a558411365737c0d653640083034420252c1d871bc8a89674a679eeddb15911d3ecaa2e533c4a9fcee9e555188cc6dfff25

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      64a3eb8cd682bfb669a8046566e332a109dbaa285b2af073a8b36c9b2315f94b

    • Size

      1.3MB

    • MD5

      8b38c64bb8923bd7f1d3c8d6b29205a8

    • SHA1

      72b526110c82ab457d01bdddc658c8767575a60a

    • SHA256

      64a3eb8cd682bfb669a8046566e332a109dbaa285b2af073a8b36c9b2315f94b

    • SHA512

      edb7bbcc488b17d25e34a2cfd2c79a558411365737c0d653640083034420252c1d871bc8a89674a679eeddb15911d3ecaa2e533c4a9fcee9e555188cc6dfff25

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks