General
-
Target
2a097b6528b1d69d02c3b35a9209ecc4.exe
-
Size
992KB
-
Sample
220929-1q2mkscae8
-
MD5
2a097b6528b1d69d02c3b35a9209ecc4
-
SHA1
47b4d6dcb3314e0bb75b99c305dadb36ed2ce27b
-
SHA256
ba921e5bd4687eec051d4e646756bb2930ec900abf061b94761d6944f906afba
-
SHA512
99cf27c3384774696a3314d29bf5d24e3a36593923c376be4bc77e113138101f9b0e4953c5547f5aecf94ba1f08de48a749401f84d270dbfa2c6de707835756c
-
SSDEEP
24576:pAOcZFOuDCeExG55TnnQlEqnEchu2NHQqW:DIDC/0z47Ec02NwZ
Static task
static1
Behavioral task
behavioral1
Sample
2a097b6528b1d69d02c3b35a9209ecc4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a097b6528b1d69d02c3b35a9209ecc4.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
2a097b6528b1d69d02c3b35a9209ecc4.exe
-
Size
992KB
-
MD5
2a097b6528b1d69d02c3b35a9209ecc4
-
SHA1
47b4d6dcb3314e0bb75b99c305dadb36ed2ce27b
-
SHA256
ba921e5bd4687eec051d4e646756bb2930ec900abf061b94761d6944f906afba
-
SHA512
99cf27c3384774696a3314d29bf5d24e3a36593923c376be4bc77e113138101f9b0e4953c5547f5aecf94ba1f08de48a749401f84d270dbfa2c6de707835756c
-
SSDEEP
24576:pAOcZFOuDCeExG55TnnQlEqnEchu2NHQqW:DIDC/0z47Ec02NwZ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-