General
-
Target
5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c
-
Size
1.3MB
-
Sample
221031-yqw1zscee6
-
MD5
ccb4e2da82b3a8e1257966d5d32058db
-
SHA1
693cbe1cba030a7a0e640703a181e1ee95a0f65c
-
SHA256
5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c
-
SHA512
e8ee0d20f120db6287c3370447d021960e7a0a8f3a38a7031c2466ded1d4c0996c2bad314c36d9c72e34b7cba9a88b5f1bcf97592237368ee657848ee43c8cb6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c
-
Size
1.3MB
-
MD5
ccb4e2da82b3a8e1257966d5d32058db
-
SHA1
693cbe1cba030a7a0e640703a181e1ee95a0f65c
-
SHA256
5e5cd35a572ea1f17b9cc4199de8eec981fc10fa8bd2477fa95ade8ec1fad00c
-
SHA512
e8ee0d20f120db6287c3370447d021960e7a0a8f3a38a7031c2466ded1d4c0996c2bad314c36d9c72e34b7cba9a88b5f1bcf97592237368ee657848ee43c8cb6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-