General

  • Target

    0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c

  • Size

    1.3MB

  • Sample

    221103-dmhnzaeaa6

  • MD5

    743d406a4e451bdb763178e63d9b9d16

  • SHA1

    3b751c502d635d4c4907cd5a9bd5e5abe565afd4

  • SHA256

    0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c

  • SHA512

    1ed77deb2a1844931a03dd8b064c982f0174a31cf424c78c49419ef870e8a027289ed37ed101aeb7279e59d3b59cc41f582368d60b86901ecf5d18c8e5483b09

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c

    • Size

      1.3MB

    • MD5

      743d406a4e451bdb763178e63d9b9d16

    • SHA1

      3b751c502d635d4c4907cd5a9bd5e5abe565afd4

    • SHA256

      0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c

    • SHA512

      1ed77deb2a1844931a03dd8b064c982f0174a31cf424c78c49419ef870e8a027289ed37ed101aeb7279e59d3b59cc41f582368d60b86901ecf5d18c8e5483b09

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks