General

  • Target

    c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800

  • Size

    1.3MB

  • Sample

    221102-kwvs8aaeh3

  • MD5

    cd4c52e74126519b1000925da79b33ea

  • SHA1

    33bdda2679ef83acb055a2bafb57100c98b89ef4

  • SHA256

    c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800

  • SHA512

    9d1e2e4b68db3fac2f8a2ef33be293304c2f660ca9478fcf71f9d66aa561036c9fe09b1226570066444e9e1c4c62c60396325b38ae849dcba19b2e08ae3008d4

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800

    • Size

      1.3MB

    • MD5

      cd4c52e74126519b1000925da79b33ea

    • SHA1

      33bdda2679ef83acb055a2bafb57100c98b89ef4

    • SHA256

      c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800

    • SHA512

      9d1e2e4b68db3fac2f8a2ef33be293304c2f660ca9478fcf71f9d66aa561036c9fe09b1226570066444e9e1c4c62c60396325b38ae849dcba19b2e08ae3008d4

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks