General
-
Target
94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42
-
Size
1.3MB
-
Sample
221031-xqhypachgl
-
MD5
45b67809d32c3be872f814f538aa5dd3
-
SHA1
14d2351e60d931ccec38e8c87506fe5402671451
-
SHA256
94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42
-
SHA512
f411e24d1775ab9601ed73de28afe6bff9faeba7dbf80b5b819599b1aaf1575d0bd8a0b7d35e3ca7f6542479049e344753ea4ac9fa1048997120cb6d81229400
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42
-
Size
1.3MB
-
MD5
45b67809d32c3be872f814f538aa5dd3
-
SHA1
14d2351e60d931ccec38e8c87506fe5402671451
-
SHA256
94a3de8f76a01e135be6cb9c3202ea9c46904a353dbd8df2f11368755d744e42
-
SHA512
f411e24d1775ab9601ed73de28afe6bff9faeba7dbf80b5b819599b1aaf1575d0bd8a0b7d35e3ca7f6542479049e344753ea4ac9fa1048997120cb6d81229400
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-