General

  • Target

    8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540

  • Size

    1.3MB

  • Sample

    230202-x646vsaa4y

  • MD5

    9e3d19ebba6356efb4c1858a8a86090d

  • SHA1

    b4082ef25a68a18b814d62ec81f0d431158c8611

  • SHA256

    8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540

  • SHA512

    055e144103b7205821e4a4763a29628f9517ff9010e7c492ec2cf4bf81658ddf1d53f03a4ed97803c02c4a783f3f24e62353f891b949401257d532909e863f56

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540

    • Size

      1.3MB

    • MD5

      9e3d19ebba6356efb4c1858a8a86090d

    • SHA1

      b4082ef25a68a18b814d62ec81f0d431158c8611

    • SHA256

      8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540

    • SHA512

      055e144103b7205821e4a4763a29628f9517ff9010e7c492ec2cf4bf81658ddf1d53f03a4ed97803c02c4a783f3f24e62353f891b949401257d532909e863f56

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks