General

  • Target

    03d632c3c62e085f3ae3306cf63a0859.exe

  • Size

    4.0MB

  • Sample

    230115-1qgbmsch37

  • MD5

    03d632c3c62e085f3ae3306cf63a0859

  • SHA1

    b3062d5e92f77e7e5293196421fa19e7bcba9cc7

  • SHA256

    8706fb4b194e6b9052aa02d250d33ced312bd84510d6ad49ff8a328e3644a14b

  • SHA512

    b3a5463e0affafd882a0a785325f963591496332989a2b9d86ea618fcff9cb4efcb814bddfddf8533c8d61668c36ae970da06c415da5570c9e7b90b058c2d9b8

  • SSDEEP

    98304:JCeCsdoOk1Qqrx+14KBDYauafqeu3M5qOmCc8:hdnkOq4iYEauaft4gtZ

Score
10/10

Malware Config

Targets

    • Target

      03d632c3c62e085f3ae3306cf63a0859.exe

    • Size

      4.0MB

    • MD5

      03d632c3c62e085f3ae3306cf63a0859

    • SHA1

      b3062d5e92f77e7e5293196421fa19e7bcba9cc7

    • SHA256

      8706fb4b194e6b9052aa02d250d33ced312bd84510d6ad49ff8a328e3644a14b

    • SHA512

      b3a5463e0affafd882a0a785325f963591496332989a2b9d86ea618fcff9cb4efcb814bddfddf8533c8d61668c36ae970da06c415da5570c9e7b90b058c2d9b8

    • SSDEEP

      98304:JCeCsdoOk1Qqrx+14KBDYauafqeu3M5qOmCc8:hdnkOq4iYEauaft4gtZ

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks