General

  • Target

    b84a7ed8d683bf31e5b490b96d89b6216ea1655d98ed63b13f61f7f36e289381

  • Size

    1.3MB

  • Sample

    221101-nd143abcf8

  • MD5

    bca157a0b23a0af0f59ef16e83cc5d1a

  • SHA1

    fc4bd2544619ce9d94968abe0d7474e72d4dfd0a

  • SHA256

    b84a7ed8d683bf31e5b490b96d89b6216ea1655d98ed63b13f61f7f36e289381

  • SHA512

    127407a8614a51679d7ac76b8fac334cea9f56afa49df6737eae41ef6dc3f56a7914a485f089c51c8c7a295305ceef498c07456ff4f9895c2385c3d5c1294ebb

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      b84a7ed8d683bf31e5b490b96d89b6216ea1655d98ed63b13f61f7f36e289381

    • Size

      1.3MB

    • MD5

      bca157a0b23a0af0f59ef16e83cc5d1a

    • SHA1

      fc4bd2544619ce9d94968abe0d7474e72d4dfd0a

    • SHA256

      b84a7ed8d683bf31e5b490b96d89b6216ea1655d98ed63b13f61f7f36e289381

    • SHA512

      127407a8614a51679d7ac76b8fac334cea9f56afa49df6737eae41ef6dc3f56a7914a485f089c51c8c7a295305ceef498c07456ff4f9895c2385c3d5c1294ebb

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks