General
-
Target
71b69163276b84e02d3015b9a9bb5772d7d9ab444c2ac5ecd06f897e4d6a9542
-
Size
1.3MB
-
Sample
221031-zl66tsdgfn
-
MD5
903457517d81adccf1d8c8e686892436
-
SHA1
ff88ffec2bf7ad82c279568f8c749a6b55480661
-
SHA256
71b69163276b84e02d3015b9a9bb5772d7d9ab444c2ac5ecd06f897e4d6a9542
-
SHA512
626e9e8278005e0949a8a9f2e8453a5000132e56d001b2677de0a4d3187fd17f50d4a272fb00892949f254a96b89ff95fc3974d54f8c5373afbd63e1b4169cbc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
71b69163276b84e02d3015b9a9bb5772d7d9ab444c2ac5ecd06f897e4d6a9542.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
71b69163276b84e02d3015b9a9bb5772d7d9ab444c2ac5ecd06f897e4d6a9542
-
Size
1.3MB
-
MD5
903457517d81adccf1d8c8e686892436
-
SHA1
ff88ffec2bf7ad82c279568f8c749a6b55480661
-
SHA256
71b69163276b84e02d3015b9a9bb5772d7d9ab444c2ac5ecd06f897e4d6a9542
-
SHA512
626e9e8278005e0949a8a9f2e8453a5000132e56d001b2677de0a4d3187fd17f50d4a272fb00892949f254a96b89ff95fc3974d54f8c5373afbd63e1b4169cbc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-