General
-
Target
a98f5950aa31da12d12eb53a4566b095715c5b6899975066ea94b5794a0efe94
-
Size
1.3MB
-
Sample
221031-2wfgzadhg2
-
MD5
dbd9581d35045af89295ce9dae09667a
-
SHA1
5cd0f7e8660299a5c4de79af7552637d13d3151d
-
SHA256
a98f5950aa31da12d12eb53a4566b095715c5b6899975066ea94b5794a0efe94
-
SHA512
bc18de55ed94b61c38697bd5bd309f55308c0c22e985244a5cde89ee952e4a638e14845298e91cf70891e4e49cf1dcdbc1f8a9864b7c6320359bdaee72eaa7dd
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
a98f5950aa31da12d12eb53a4566b095715c5b6899975066ea94b5794a0efe94.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
a98f5950aa31da12d12eb53a4566b095715c5b6899975066ea94b5794a0efe94
-
Size
1.3MB
-
MD5
dbd9581d35045af89295ce9dae09667a
-
SHA1
5cd0f7e8660299a5c4de79af7552637d13d3151d
-
SHA256
a98f5950aa31da12d12eb53a4566b095715c5b6899975066ea94b5794a0efe94
-
SHA512
bc18de55ed94b61c38697bd5bd309f55308c0c22e985244a5cde89ee952e4a638e14845298e91cf70891e4e49cf1dcdbc1f8a9864b7c6320359bdaee72eaa7dd
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-