General

  • Target

    1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9

  • Size

    1.3MB

  • Sample

    230203-lnle9ahc7y

  • MD5

    efe75a185387d1c9494673ac47ce3256

  • SHA1

    96b596dbb94735a20642b7eb5b28f850d4d5a6f1

  • SHA256

    1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9

  • SHA512

    cd7ab1b2ecc9bc6c37f50b0dcb429b22dfa91fd9303af109515647007a1d86f5d1f44355518a7c2ba5da5f28099c922d08970676dd1b834dce917af800c7367a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Targets

    • Target

      1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9

    • Size

      1.3MB

    • MD5

      efe75a185387d1c9494673ac47ce3256

    • SHA1

      96b596dbb94735a20642b7eb5b28f850d4d5a6f1

    • SHA256

      1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9

    • SHA512

      cd7ab1b2ecc9bc6c37f50b0dcb429b22dfa91fd9303af109515647007a1d86f5d1f44355518a7c2ba5da5f28099c922d08970676dd1b834dce917af800c7367a

    • SSDEEP

      24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks