General

  • Target

    b134e4e5d74eb1a5ddd66625837b44ed6d23fbac004bbaae91ece785b7c574e3_JC.exe

  • Size

    1.3MB

  • Sample

    230827-tqa2asbd69

  • MD5

    397f5c91fd7cafc22c3fe28bc8fe675a

  • SHA1

    02e127ae9c5a55e9b48731a3d47220cdb056f3eb

  • SHA256

    b134e4e5d74eb1a5ddd66625837b44ed6d23fbac004bbaae91ece785b7c574e3

  • SHA512

    fdb348e8d451e68f59c02c57dcc788e486f7244211687b854463768961c50bd70fad6e5e0e2e66dd3c42666fa6d04fcf1014e3dd356011eeaba4a6a7031bf311

  • SSDEEP

    24576:dA1MqYjjU6kS6e5jB/n4L6JXWutEcPO6KhepiKnG/hnPrdSkl+j9aTw1OquD:d4dK756e5VgL6JXWutEcLmesKG/hQzj4

Score
10/10

Malware Config

Targets

    • Target

      b134e4e5d74eb1a5ddd66625837b44ed6d23fbac004bbaae91ece785b7c574e3_JC.exe

    • Size

      1.3MB

    • MD5

      397f5c91fd7cafc22c3fe28bc8fe675a

    • SHA1

      02e127ae9c5a55e9b48731a3d47220cdb056f3eb

    • SHA256

      b134e4e5d74eb1a5ddd66625837b44ed6d23fbac004bbaae91ece785b7c574e3

    • SHA512

      fdb348e8d451e68f59c02c57dcc788e486f7244211687b854463768961c50bd70fad6e5e0e2e66dd3c42666fa6d04fcf1014e3dd356011eeaba4a6a7031bf311

    • SSDEEP

      24576:dA1MqYjjU6kS6e5jB/n4L6JXWutEcPO6KhepiKnG/hnPrdSkl+j9aTw1OquD:d4dK756e5VgL6JXWutEcLmesKG/hQzj4

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks