General

  • Target

    05ba2637e1a58ac3dadcf0070982dd824fa1f16d76acc3d096d50ca21af2710c

  • Size

    1.3MB

  • Sample

    221031-xm5y2scah3

  • MD5

    17112ee94ca77f54b47a55abf557e6a1

  • SHA1

    87137bbb3202d3458a3f3cbd7b762026a7c77a49

  • SHA256

    05ba2637e1a58ac3dadcf0070982dd824fa1f16d76acc3d096d50ca21af2710c

  • SHA512

    ba8c2317c6accc2791f184a82193bac42f4ca3ea8f686fe3da42571ea50d1a1fa79bb4a60f270a7fee1d338025822cf66f8a0a67144aa195479872ab8083e08d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      05ba2637e1a58ac3dadcf0070982dd824fa1f16d76acc3d096d50ca21af2710c

    • Size

      1.3MB

    • MD5

      17112ee94ca77f54b47a55abf557e6a1

    • SHA1

      87137bbb3202d3458a3f3cbd7b762026a7c77a49

    • SHA256

      05ba2637e1a58ac3dadcf0070982dd824fa1f16d76acc3d096d50ca21af2710c

    • SHA512

      ba8c2317c6accc2791f184a82193bac42f4ca3ea8f686fe3da42571ea50d1a1fa79bb4a60f270a7fee1d338025822cf66f8a0a67144aa195479872ab8083e08d

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks