General

  • Target

    e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa

  • Size

    1.3MB

  • Sample

    221102-m6bjfabcf3

  • MD5

    0a5cc64f2f77f6bc3271fe5feae3d707

  • SHA1

    a0e400ce0a4914790da7af3634f559ed95bb26df

  • SHA256

    e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa

  • SHA512

    8e873477bd5975e160c534ba1ebd6ca6714b63f07dac32314118afe8bbf47fd8100c2dab79f14e3d69351321945867848183e4b7ca0536a36c38f09ec0ace1cf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa

    • Size

      1.3MB

    • MD5

      0a5cc64f2f77f6bc3271fe5feae3d707

    • SHA1

      a0e400ce0a4914790da7af3634f559ed95bb26df

    • SHA256

      e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa

    • SHA512

      8e873477bd5975e160c534ba1ebd6ca6714b63f07dac32314118afe8bbf47fd8100c2dab79f14e3d69351321945867848183e4b7ca0536a36c38f09ec0ace1cf

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks