General
-
Target
fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea
-
Size
1.3MB
-
Sample
221031-xd5lxsbhg9
-
MD5
9d4c63f291700110d07ddfc99c070c1e
-
SHA1
8e74a2b4ffe3ad31e86bc449bd267bacdabac3a2
-
SHA256
fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea
-
SHA512
444e6e3ff167c7c21bd45cefb582afeeb30e0e6150fa8b411af50c4d270fc2e6202aa7add562223393c15ab68850ec05b67f93a35fcbac441f95922e0b988aa2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea
-
Size
1.3MB
-
MD5
9d4c63f291700110d07ddfc99c070c1e
-
SHA1
8e74a2b4ffe3ad31e86bc449bd267bacdabac3a2
-
SHA256
fe38269743b859fac313a354198e60cc6f6b5b5c26d71c70b8e8f2848a22afea
-
SHA512
444e6e3ff167c7c21bd45cefb582afeeb30e0e6150fa8b411af50c4d270fc2e6202aa7add562223393c15ab68850ec05b67f93a35fcbac441f95922e0b988aa2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-