General
-
Target
fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97
-
Size
1.3MB
-
Sample
221031-16dwfseebq
-
MD5
775dd71aaa703e4529a6c7942997f675
-
SHA1
c93470d385b911c919034cf881bdde1fe3550362
-
SHA256
fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97
-
SHA512
d9df56ebda0634c962fd2efd6678f9cec643677ee3521acdecfa87436293b0137fd97c1fe14f849f36e7d1f7426a5f2353d264897606b91bbdd427de8ac90b4a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97
-
Size
1.3MB
-
MD5
775dd71aaa703e4529a6c7942997f675
-
SHA1
c93470d385b911c919034cf881bdde1fe3550362
-
SHA256
fa1bcbf0a0366ba429f57f5a6867522ca6596f6079448d64accc631b825c7f97
-
SHA512
d9df56ebda0634c962fd2efd6678f9cec643677ee3521acdecfa87436293b0137fd97c1fe14f849f36e7d1f7426a5f2353d264897606b91bbdd427de8ac90b4a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-