General

  • Target

    47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0

  • Size

    1.3MB

  • Sample

    221031-w7cybscfgl

  • MD5

    e7776498c593315246451f8d43852683

  • SHA1

    49f5c1376d4ebdd0b744b8b09ec4d21ab270cad3

  • SHA256

    47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0

  • SHA512

    6ebd921dfa38f3280d7a5335033de030b6054746ac8e7625ae4211593834c574ccae2a919b2b753312ed1bd83430e2f480047009a523c37f7bc3bf4d654715e8

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0

    • Size

      1.3MB

    • MD5

      e7776498c593315246451f8d43852683

    • SHA1

      49f5c1376d4ebdd0b744b8b09ec4d21ab270cad3

    • SHA256

      47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0

    • SHA512

      6ebd921dfa38f3280d7a5335033de030b6054746ac8e7625ae4211593834c574ccae2a919b2b753312ed1bd83430e2f480047009a523c37f7bc3bf4d654715e8

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks