General

  • Target

    5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c

  • Size

    1.3MB

  • Sample

    221031-yqw1zscee6

  • MD5

    ccb4e2da82b3a8e1257966d5d32058db

  • SHA1

    693cbe1cba030a7a0e640703a181e1ee95a0f65c

  • SHA256

    5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c

  • SHA512

    e8ee0d20f120db6287c3370447d021960e7a0a8f3a38a7031c2466ded1d4c0996c2bad314c36d9c72e34b7cba9a88b5f1bcf97592237368ee657848ee43c8cb6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c

    • Size

      1.3MB

    • MD5

      ccb4e2da82b3a8e1257966d5d32058db

    • SHA1

      693cbe1cba030a7a0e640703a181e1ee95a0f65c

    • SHA256

      5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c

    • SHA512

      e8ee0d20f120db6287c3370447d021960e7a0a8f3a38a7031c2466ded1d4c0996c2bad314c36d9c72e34b7cba9a88b5f1bcf97592237368ee657848ee43c8cb6

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks