General

  • Target

    94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42

  • Size

    1.3MB

  • Sample

    221031-xqhypachgl

  • MD5

    45b67809d32c3be872f814f538aa5dd3

  • SHA1

    14d2351e60d931ccec38e8c87506fe5402671451

  • SHA256

    94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42

  • SHA512

    f411e24d1775ab9601ed73de28afe6bff9faeba7dbf80b5b819599b1aaf1575d0bd8a0b7d35e3ca7f6542479049e344753ea4ac9fa1048997120cb6d81229400

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42

    • Size

      1.3MB

    • MD5

      45b67809d32c3be872f814f538aa5dd3

    • SHA1

      14d2351e60d931ccec38e8c87506fe5402671451

    • SHA256

      94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42

    • SHA512

      f411e24d1775ab9601ed73de28afe6bff9faeba7dbf80b5b819599b1aaf1575d0bd8a0b7d35e3ca7f6542479049e344753ea4ac9fa1048997120cb6d81229400

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks