General

  • Target

    a89375051c78e7e567cf4ef2d349d8d3.exe

  • Size

    1.1MB

  • Sample

    230808-xhgqnagh5w

  • MD5

    a89375051c78e7e567cf4ef2d349d8d3

  • SHA1

    b83f1fda831481344fae26a7ce92740d38b38e54

  • SHA256

    679bf1ece5d0a3592e49f135d5bedcc5748565a1c4d05b785017f0c53e2d0eca

  • SHA512

    c6310e3af3e48b42f8f60dc7d401f20408d3b3687add5e9991d88a3f00cab5c59d11861a2cfbf5d5472655e0eb89afc671da919082b0a825cc7f70caf2166712

  • SSDEEP

    24576:qADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:sE86MVX/SwHmf

Malware Config

Targets

    • Target

      a89375051c78e7e567cf4ef2d349d8d3.exe

    • Size

      1.1MB

    • MD5

      a89375051c78e7e567cf4ef2d349d8d3

    • SHA1

      b83f1fda831481344fae26a7ce92740d38b38e54

    • SHA256

      679bf1ece5d0a3592e49f135d5bedcc5748565a1c4d05b785017f0c53e2d0eca

    • SHA512

      c6310e3af3e48b42f8f60dc7d401f20408d3b3687add5e9991d88a3f00cab5c59d11861a2cfbf5d5472655e0eb89afc671da919082b0a825cc7f70caf2166712

    • SSDEEP

      24576:qADdteLS1VO6wLVqq0aJSw69voIN7y7Di0:sE86MVX/SwHmf

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks