General

  • Target

    8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0

  • Size

    1.3MB

  • Sample

    221101-yp8y6afdhn

  • MD5

    d9d752cbbabfd56833c8d416e21be396

  • SHA1

    25ec9b81096098a3ccb6f37155da5ed634ee0af1

  • SHA256

    8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0

  • SHA512

    ddf7eb467e69703e16ffc33d73ce27a395aca979d6f443acb45b8e6b030d460bd0f1f170bd424d230ce7e73f0be602ac481f2a9c0f59fb9a9d198f33a0ead3a4

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0

    • Size

      1.3MB

    • MD5

      d9d752cbbabfd56833c8d416e21be396

    • SHA1

      25ec9b81096098a3ccb6f37155da5ed634ee0af1

    • SHA256

      8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0

    • SHA512

      ddf7eb467e69703e16ffc33d73ce27a395aca979d6f443acb45b8e6b030d460bd0f1f170bd424d230ce7e73f0be602ac481f2a9c0f59fb9a9d198f33a0ead3a4

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks