General
-
Target
64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf
-
Size
1.3MB
-
Sample
221031-zfaknsdgal
-
MD5
a8c7d8ed699333270d0d222d616ce16d
-
SHA1
790b1deaaaba70335c152e793befac773b29a98f
-
SHA256
64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf
-
SHA512
804b712b6a06180b0588fc1f3b86f102cd3b8996e308df55f6ffb2ee7a6b31d7af5fab25d9344dde5a625e55a5a21f35b289495dddaf61f0c963c6d22f39c5fa
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf
-
Size
1.3MB
-
MD5
a8c7d8ed699333270d0d222d616ce16d
-
SHA1
790b1deaaaba70335c152e793befac773b29a98f
-
SHA256
64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf
-
SHA512
804b712b6a06180b0588fc1f3b86f102cd3b8996e308df55f6ffb2ee7a6b31d7af5fab25d9344dde5a625e55a5a21f35b289495dddaf61f0c963c6d22f39c5fa
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-