General

  • Target

    d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46

  • Size

    1.3MB

  • Sample

    221101-wpt4wsehcp

  • MD5

    cb2c48182558b9ad18c036a9e00b2278

  • SHA1

    1bef10a869e7734a72b9654e15e686053966b5af

  • SHA256

    d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46

  • SHA512

    5f7d026fda453e398529fbdb00f2cf9e19547a78994197510ef70d850ee87ce4b8bcfd4ebe79c88eece4c3328ff8080cbce10e15853bfa94cb381dc36990ba97

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46

    • Size

      1.3MB

    • MD5

      cb2c48182558b9ad18c036a9e00b2278

    • SHA1

      1bef10a869e7734a72b9654e15e686053966b5af

    • SHA256

      d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46

    • SHA512

      5f7d026fda453e398529fbdb00f2cf9e19547a78994197510ef70d850ee87ce4b8bcfd4ebe79c88eece4c3328ff8080cbce10e15853bfa94cb381dc36990ba97

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks