General

  • Target

    ae857b2e3ed75dd4ef375b9bd89ef2a2aca07829af3955508890219f64bf0ea7

  • Size

    1.3MB

  • Sample

    221031-xkbx7acae9

  • MD5

    0979761e5d57c166d3dc2cee8e32bdd2

  • SHA1

    dc704606f8be394eee6138d486978e9b09b96d5b

  • SHA256

    ae857b2e3ed75dd4ef375b9bd89ef2a2aca07829af3955508890219f64bf0ea7

  • SHA512

    961dce9a118ce57daa501a33a4bff250cdc49cacde441c9facb6209ad47b0481d567ff90791cafe5aa5c3badfc2545ff5994aecdfcd93ee08905ae3978c63ebe

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      ae857b2e3ed75dd4ef375b9bd89ef2a2aca07829af3955508890219f64bf0ea7

    • Size

      1.3MB

    • MD5

      0979761e5d57c166d3dc2cee8e32bdd2

    • SHA1

      dc704606f8be394eee6138d486978e9b09b96d5b

    • SHA256

      ae857b2e3ed75dd4ef375b9bd89ef2a2aca07829af3955508890219f64bf0ea7

    • SHA512

      961dce9a118ce57daa501a33a4bff250cdc49cacde441c9facb6209ad47b0481d567ff90791cafe5aa5c3badfc2545ff5994aecdfcd93ee08905ae3978c63ebe

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks