General

  • Target

    client.exe

  • Size

    2.1MB

  • Sample

    241204-srrj1ayrfx

  • MD5

    bf4f13d82d217ed69d80124c50d9441c

  • SHA1

    b7ee7d109f61371342e924e6a0c3505347dd318f

  • SHA256

    51890bfc6f223014ff16f4bfa6ace8e2d2ec3c81eb6965406813b9ca32b08508

  • SHA512

    1ba17e55d6d1f6fda99daffe3f11f995d5e8434901b2aea9105728ccbff1b81727d96bf8811a62e8367fca0ec23bdea331165b001088b183281164269668d2f4

  • SSDEEP

    49152:IBJzOZxI4F2vH8tr79p4MUm96NqpbJEQS8M0fPqnG9c:yBOZxI4Fftr79fkNqS07u

Malware Config

Targets

    • Target

      client.exe

    • Size

      2.1MB

    • MD5

      bf4f13d82d217ed69d80124c50d9441c

    • SHA1

      b7ee7d109f61371342e924e6a0c3505347dd318f

    • SHA256

      51890bfc6f223014ff16f4bfa6ace8e2d2ec3c81eb6965406813b9ca32b08508

    • SHA512

      1ba17e55d6d1f6fda99daffe3f11f995d5e8434901b2aea9105728ccbff1b81727d96bf8811a62e8367fca0ec23bdea331165b001088b183281164269668d2f4

    • SSDEEP

      49152:IBJzOZxI4F2vH8tr79p4MUm96NqpbJEQS8M0fPqnG9c:yBOZxI4Fftr79fkNqS07u

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks