General
-
Target
ab7fbb991d61dcb9affcb581c459e9d3.exe
-
Size
2.3MB
-
Sample
220209-dy7ggahccq
-
MD5
ab7fbb991d61dcb9affcb581c459e9d3
-
SHA1
abe33bd69ac60e2a0b06ed8201d41fb430ff518c
-
SHA256
493a2547e41f5c448e3638a63a91a3b07950202fb912d187688223eb4081483f
-
SHA512
edca9ae34af65a69c7b157adfcc17579e6cd2bfe80aef9c05cb7c1534d49992e234ba43ba76987d6d22d020cf47e34e32c2c600b09df1ff49f1055a0d7e0b5cb
Static task
static1
Behavioral task
behavioral1
Sample
ab7fbb991d61dcb9affcb581c459e9d3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ab7fbb991d61dcb9affcb581c459e9d3.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
ab7fbb991d61dcb9affcb581c459e9d3.exe
-
Size
2.3MB
-
MD5
ab7fbb991d61dcb9affcb581c459e9d3
-
SHA1
abe33bd69ac60e2a0b06ed8201d41fb430ff518c
-
SHA256
493a2547e41f5c448e3638a63a91a3b07950202fb912d187688223eb4081483f
-
SHA512
edca9ae34af65a69c7b157adfcc17579e6cd2bfe80aef9c05cb7c1534d49992e234ba43ba76987d6d22d020cf47e34e32c2c600b09df1ff49f1055a0d7e0b5cb
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Adds Run key to start application
-
Drops file in System32 directory
-