General

  • Target

    5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2

  • Size

    1.3MB

  • Sample

    221102-k4pbeaafc8

  • MD5

    735f87c106f06f50b7af10f78d7c53ed

  • SHA1

    363d0466e31781ba0ff60eb1d5e946a870d31deb

  • SHA256

    5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2

  • SHA512

    b513292891e73c2d21414ec6b5c58ac543f40e428d0d48cbaa9cec7465d407c18eb51ce3059cd3247152a743f83888a3aff18f815a4cc6c8c29d13e6755bcbe5

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2

    • Size

      1.3MB

    • MD5

      735f87c106f06f50b7af10f78d7c53ed

    • SHA1

      363d0466e31781ba0ff60eb1d5e946a870d31deb

    • SHA256

      5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2

    • SHA512

      b513292891e73c2d21414ec6b5c58ac543f40e428d0d48cbaa9cec7465d407c18eb51ce3059cd3247152a743f83888a3aff18f815a4cc6c8c29d13e6755bcbe5

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks