General

  • Target

    ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca

  • Size

    1.3MB

  • Sample

    221101-nqcbgacdfj

  • MD5

    bcae0da037173d4412426a37280f5b81

  • SHA1

    8b412f5d09f1509eb637b43e5e476f336c8e5ff6

  • SHA256

    ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca

  • SHA512

    bf0b4fe136be815a323867be87190fc04aa8d6160dc4c34d493c90d881b1fd3e5b279799de34348ecac48153a094a73f5901258f4d8d4f1df0974def5e7fbc60

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca

    • Size

      1.3MB

    • MD5

      bcae0da037173d4412426a37280f5b81

    • SHA1

      8b412f5d09f1509eb637b43e5e476f336c8e5ff6

    • SHA256

      ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca

    • SHA512

      bf0b4fe136be815a323867be87190fc04aa8d6160dc4c34d493c90d881b1fd3e5b279799de34348ecac48153a094a73f5901258f4d8d4f1df0974def5e7fbc60

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks