General

  • Target

    03d632c3c62e085f3ae3306cf63a0859.bin

  • Size

    3.6MB

  • Sample

    230123-q2te8sdd92

  • MD5

    982d4f6951e8f61c79f4b629e98a6657

  • SHA1

    5815cdc7836a9264724632a67ffa5f606cba1104

  • SHA256

    030e80a7af65e534ee4974b44c12bca9ed20e6599461688b654edf6d6525c8a9

  • SHA512

    2cc754ed9b917522fc252fd770e5a414199e350ef694925bda5b687500572f4898b522e65e53c5f1f10786f076a9c36b77c10c9be050d5f7d2e7d9c94209138e

  • SSDEEP

    98304:AZg6br3T2yB+1B7xFMV+G7QN9SLTpdUnIGqSBpUtqo3V1N:AzK2+1BIVDcN8xdUIOcF3VP

Score
10/10

Malware Config

Targets

    • Target

      8706fb4b194e6b9052aa02d250d33ced312bd84510d6ad49ff8a328e3644a14b.exe

    • Size

      4.0MB

    • MD5

      03d632c3c62e085f3ae3306cf63a0859

    • SHA1

      b3062d5e92f77e7e5293196421fa19e7bcba9cc7

    • SHA256

      8706fb4b194e6b9052aa02d250d33ced312bd84510d6ad49ff8a328e3644a14b

    • SHA512

      b3a5463e0affafd882a0a785325f963591496332989a2b9d86ea618fcff9cb4efcb814bddfddf8533c8d61668c36ae970da06c415da5570c9e7b90b058c2d9b8

    • SSDEEP

      98304:JCeCsdoOk1Qqrx+14KBDYauafqeu3M5qOmCc8:hdnkOq4iYEauaft4gtZ

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks