General

  • Target

    cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759

  • Size

    1.3MB

  • Sample

    221105-vj7x5ababj

  • MD5

    9e81f67213f89b7c4dba4c20dd06eff0

  • SHA1

    7c3a15b441f52785d5f8199a5a22501b6b37be5c

  • SHA256

    cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759

  • SHA512

    1287d6f7521a888cb83289097e0ee29520de8f9eac78d66ee35e5c515332441528066673cf4f2f2db54bf9b10b3bcce3c99fca13686feed02340bdcfe13acc59

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759

    • Size

      1.3MB

    • MD5

      9e81f67213f89b7c4dba4c20dd06eff0

    • SHA1

      7c3a15b441f52785d5f8199a5a22501b6b37be5c

    • SHA256

      cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759

    • SHA512

      1287d6f7521a888cb83289097e0ee29520de8f9eac78d66ee35e5c515332441528066673cf4f2f2db54bf9b10b3bcce3c99fca13686feed02340bdcfe13acc59

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks