General
-
Target
7f815c73fba16afab1ebd487649b27b93fd8becb170156ca07781a732fb6fc44
-
Size
1.3MB
-
Sample
221031-yk45eacea5
-
MD5
c8fc3b68b8cbc4f254755f61ceb894c5
-
SHA1
0b72dfba18ea6fb0b7b24f35e9ad6181358673ae
-
SHA256
7f815c73fba16afab1ebd487649b27b93fd8becb170156ca07781a732fb6fc44
-
SHA512
0042c65d8874b491a3e1d0f4573658e7d25bbf2076d22b2dad361e17b3860068f2469a296f695b8320f70b2ccb028b7e9b781da1bc3f22e90b26c7ce572bd0ed
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
7f815c73fba16afab1ebd487649b27b93fd8becb170156ca07781a732fb6fc44.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
7f815c73fba16afab1ebd487649b27b93fd8becb170156ca07781a732fb6fc44
-
Size
1.3MB
-
MD5
c8fc3b68b8cbc4f254755f61ceb894c5
-
SHA1
0b72dfba18ea6fb0b7b24f35e9ad6181358673ae
-
SHA256
7f815c73fba16afab1ebd487649b27b93fd8becb170156ca07781a732fb6fc44
-
SHA512
0042c65d8874b491a3e1d0f4573658e7d25bbf2076d22b2dad361e17b3860068f2469a296f695b8320f70b2ccb028b7e9b781da1bc3f22e90b26c7ce572bd0ed
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-