General
-
Target
47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0
-
Size
1.3MB
-
Sample
221031-w7cybscfgl
-
MD5
e7776498c593315246451f8d43852683
-
SHA1
49f5c1376d4ebdd0b744b8b09ec4d21ab270cad3
-
SHA256
47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0
-
SHA512
6ebd921dfa38f3280d7a5335033de030b6054746ac8e7625ae4211593834c574ccae2a919b2b753312ed1bd83430e2f480047009a523c37f7bc3bf4d654715e8
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0
-
Size
1.3MB
-
MD5
e7776498c593315246451f8d43852683
-
SHA1
49f5c1376d4ebdd0b744b8b09ec4d21ab270cad3
-
SHA256
47f9f128195e6cefd2adaa011a09ba9beac10e9129a390dfbf88ce158248b1c0
-
SHA512
6ebd921dfa38f3280d7a5335033de030b6054746ac8e7625ae4211593834c574ccae2a919b2b753312ed1bd83430e2f480047009a523c37f7bc3bf4d654715e8
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-