General

  • Target

    58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176

  • Size

    1.3MB

  • Sample

    221102-jqpvcabaek

  • MD5

    8fe5984fbeaaa6e5b0f7b6b62f75f201

  • SHA1

    45ae293f85b063724540cb24bc6f954e8ea13b91

  • SHA256

    58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176

  • SHA512

    d7089a7973c9c8578cbc9d85214bf05084d52f0d09c8b28ded755ba37f3d0e3241c431c3fe356ca01a82c32bbe3a99aa348cd4015f132360f2067872f048c8ff

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176

    • Size

      1.3MB

    • MD5

      8fe5984fbeaaa6e5b0f7b6b62f75f201

    • SHA1

      45ae293f85b063724540cb24bc6f954e8ea13b91

    • SHA256

      58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176

    • SHA512

      d7089a7973c9c8578cbc9d85214bf05084d52f0d09c8b28ded755ba37f3d0e3241c431c3fe356ca01a82c32bbe3a99aa348cd4015f132360f2067872f048c8ff

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks