General

  • Target

    a9cedbe36e2eb526b66ded4d597efbd43f6381770ecda1b7ad4fae3ed9d5927c

  • Size

    1.3MB

  • Sample

    230203-cznkbaaa58

  • MD5

    4210b46918727bff208b47c156a173e0

  • SHA1

    af40edb01338dca0d4f115b5c38a34dd2444c43d

  • SHA256

    a9cedbe36e2eb526b66ded4d597efbd43f6381770ecda1b7ad4fae3ed9d5927c

  • SHA512

    4cb7e2b1181a56e6e5a1186fb99cb2cdacbf73dd484893c55e7b5901c17368b27c209b2683a6c23805da5931be573c32adbdac397911fba6bb5a0387368f325a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      a9cedbe36e2eb526b66ded4d597efbd43f6381770ecda1b7ad4fae3ed9d5927c

    • Size

      1.3MB

    • MD5

      4210b46918727bff208b47c156a173e0

    • SHA1

      af40edb01338dca0d4f115b5c38a34dd2444c43d

    • SHA256

      a9cedbe36e2eb526b66ded4d597efbd43f6381770ecda1b7ad4fae3ed9d5927c

    • SHA512

      4cb7e2b1181a56e6e5a1186fb99cb2cdacbf73dd484893c55e7b5901c17368b27c209b2683a6c23805da5931be573c32adbdac397911fba6bb5a0387368f325a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks