Resubmissions

30-10-2024 06:30

241030-g9zgsaycjm 10

05-04-2023 14:51

230405-r75wwshd6w 10

General

  • Target

    a26ae5eb4e86ca54a1d338220318c43b.exe

  • Size

    321KB

  • Sample

    241030-g9zgsaycjm

  • MD5

    a26ae5eb4e86ca54a1d338220318c43b

  • SHA1

    ba66b537f8b7289acf611e67e1f3b20fb5bb48db

  • SHA256

    fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

  • SHA512

    0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

  • SSDEEP

    6144:1RmCttlxSX8YOKPnzxx7YyRRYz4OjnYDh+OHYQmrBQ4rQbFZUzEo1V:vmJMYt/czYDh+OOQMQbT

Malware Config

Targets

    • Target

      a26ae5eb4e86ca54a1d338220318c43b.exe

    • Size

      321KB

    • MD5

      a26ae5eb4e86ca54a1d338220318c43b

    • SHA1

      ba66b537f8b7289acf611e67e1f3b20fb5bb48db

    • SHA256

      fd687a05b13c4f87f139d043c4d9d936b73762d616204bfb090124fd163c316e

    • SHA512

      0d2adc60f34f1d13be88df0034220e41a36f0a2dc8217fe1fc42714834f080c81f033d61f4f23af6c50c74d94d23a689714ef4c8824c96992fd478587cb31ccd

    • SSDEEP

      6144:1RmCttlxSX8YOKPnzxx7YyRRYz4OjnYDh+OHYQmrBQ4rQbFZUzEo1V:vmJMYt/czYDh+OOQMQbT

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks