General

  • Target

    64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf

  • Size

    1.3MB

  • Sample

    221031-zfaknsdgal

  • MD5

    a8c7d8ed699333270d0d222d616ce16d

  • SHA1

    790b1deaaaba70335c152e793befac773b29a98f

  • SHA256

    64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf

  • SHA512

    804b712b6a06180b0588fc1f3b86f102cd3b8996e308df55f6ffb2ee7a6b31d7af5fab25d9344dde5a625e55a5a21f35b289495dddaf61f0c963c6d22f39c5fa

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf

    • Size

      1.3MB

    • MD5

      a8c7d8ed699333270d0d222d616ce16d

    • SHA1

      790b1deaaaba70335c152e793befac773b29a98f

    • SHA256

      64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf

    • SHA512

      804b712b6a06180b0588fc1f3b86f102cd3b8996e308df55f6ffb2ee7a6b31d7af5fab25d9344dde5a625e55a5a21f35b289495dddaf61f0c963c6d22f39c5fa

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks