General
-
Target
cfdf836075f5c6ec77096212e3ec91b7fd77171b693461e88f029455ee052b74
-
Size
1.3MB
-
Sample
221031-y4fwxsdefk
-
MD5
84c074a4d9d13c00fc8cc4e48f3b49ab
-
SHA1
14ef7839b89974907833956318f51a3ddf7a3cc4
-
SHA256
cfdf836075f5c6ec77096212e3ec91b7fd77171b693461e88f029455ee052b74
-
SHA512
16f9d8c685581598c96f0105d90f1c21701289589f30ac14e1850f691464a7f02c487c67bf541cb1d80dd44b4c8fa37b421908280ffc8bca534a58713149ece7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
cfdf836075f5c6ec77096212e3ec91b7fd77171b693461e88f029455ee052b74.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
cfdf836075f5c6ec77096212e3ec91b7fd77171b693461e88f029455ee052b74
-
Size
1.3MB
-
MD5
84c074a4d9d13c00fc8cc4e48f3b49ab
-
SHA1
14ef7839b89974907833956318f51a3ddf7a3cc4
-
SHA256
cfdf836075f5c6ec77096212e3ec91b7fd77171b693461e88f029455ee052b74
-
SHA512
16f9d8c685581598c96f0105d90f1c21701289589f30ac14e1850f691464a7f02c487c67bf541cb1d80dd44b4c8fa37b421908280ffc8bca534a58713149ece7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-