General

  • Target

    050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e

  • Size

    1.3MB

  • Sample

    230203-lbbehshb3y

  • MD5

    bb032d77190a98820331cfd60e051e26

  • SHA1

    b6b4e88d497bfb13ff22448f4851d1b38c40477b

  • SHA256

    050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e

  • SHA512

    31c1c2c31bbf8f4032ed1d8b26bea015501f2d07c380d2016712e92beb9e2527db59614c5814e5f81e7027bed793d763a751d8d754bbfcf5c5da9f9082e68719

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e

    • Size

      1.3MB

    • MD5

      bb032d77190a98820331cfd60e051e26

    • SHA1

      b6b4e88d497bfb13ff22448f4851d1b38c40477b

    • SHA256

      050f95f53cfe505258bacecc315055a80d61188127430c6c078ec4730869405e

    • SHA512

      31c1c2c31bbf8f4032ed1d8b26bea015501f2d07c380d2016712e92beb9e2527db59614c5814e5f81e7027bed793d763a751d8d754bbfcf5c5da9f9082e68719

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks