General
-
Target
f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0
-
Size
1.3MB
-
Sample
221031-z29xnaeadm
-
MD5
4ea52ac8c9c51292215de13dbab698ca
-
SHA1
3319a995681d7e3f652b21cdbb3f9e84904b6954
-
SHA256
f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0
-
SHA512
c2fc9e45c87a1e0a2df7bade727671fec9ce21b175c08adcd2d5bd7649ee5c70f985f85866fb34b939baa5e3d2fd3e1b043a78d139c329cbc8614e6b075d3628
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0
-
Size
1.3MB
-
MD5
4ea52ac8c9c51292215de13dbab698ca
-
SHA1
3319a995681d7e3f652b21cdbb3f9e84904b6954
-
SHA256
f8fbd979a390840c4f262b71602dc69ca3c2bd674bf4edf4f890a612ce2a8bf0
-
SHA512
c2fc9e45c87a1e0a2df7bade727671fec9ce21b175c08adcd2d5bd7649ee5c70f985f85866fb34b939baa5e3d2fd3e1b043a78d139c329cbc8614e6b075d3628
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-