General

  • Target

    f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0

  • Size

    1.3MB

  • Sample

    221031-z29xnaeadm

  • MD5

    4ea52ac8c9c51292215de13dbab698ca

  • SHA1

    3319a995681d7e3f652b21cdbb3f9e84904b6954

  • SHA256

    f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0

  • SHA512

    c2fc9e45c87a1e0a2df7bade727671fec9ce21b175c08adcd2d5bd7649ee5c70f985f85866fb34b939baa5e3d2fd3e1b043a78d139c329cbc8614e6b075d3628

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0

    • Size

      1.3MB

    • MD5

      4ea52ac8c9c51292215de13dbab698ca

    • SHA1

      3319a995681d7e3f652b21cdbb3f9e84904b6954

    • SHA256

      f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0

    • SHA512

      c2fc9e45c87a1e0a2df7bade727671fec9ce21b175c08adcd2d5bd7649ee5c70f985f85866fb34b939baa5e3d2fd3e1b043a78d139c329cbc8614e6b075d3628

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks