General

  • Target

    f82ff7092c01312fa602b1111b1b3b254f31f45a4dd905c63f112167e6ee672f

  • Size

    1.3MB

  • Sample

    230202-3wljnaha68

  • MD5

    51339a84d3019b47a4d04d6ab8131167

  • SHA1

    b49423c7ca482f8612d0f7508fcc2d565c01ab09

  • SHA256

    f82ff7092c01312fa602b1111b1b3b254f31f45a4dd905c63f112167e6ee672f

  • SHA512

    16681a55a8275893f84b04c09117631e1c4bd495b30412203e8ed75fa9840f4468ba31ef2292f08e1898a5bc9691f84dde8d58f8fe3bfb09ead2bc8a5fd17152

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      f82ff7092c01312fa602b1111b1b3b254f31f45a4dd905c63f112167e6ee672f

    • Size

      1.3MB

    • MD5

      51339a84d3019b47a4d04d6ab8131167

    • SHA1

      b49423c7ca482f8612d0f7508fcc2d565c01ab09

    • SHA256

      f82ff7092c01312fa602b1111b1b3b254f31f45a4dd905c63f112167e6ee672f

    • SHA512

      16681a55a8275893f84b04c09117631e1c4bd495b30412203e8ed75fa9840f4468ba31ef2292f08e1898a5bc9691f84dde8d58f8fe3bfb09ead2bc8a5fd17152

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks