General
-
Target
ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1
-
Size
1.3MB
-
Sample
221101-3lhp1sfhe2
-
MD5
15110e106dc1756997c5fd148b42c8e7
-
SHA1
a495cdc3212e4989ee341db58c715345aeb4d8cb
-
SHA256
ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1
-
SHA512
96526795104e472ebda08b18ed0434e704dfeb0f6f9b1bbe1be4455b21099cd7705d456ea4dfefda64bde48c9bc626d70027f2aff978efd3cd5a8c1a6853157e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1
-
Size
1.3MB
-
MD5
15110e106dc1756997c5fd148b42c8e7
-
SHA1
a495cdc3212e4989ee341db58c715345aeb4d8cb
-
SHA256
ec331a6508950fda98ae6fd726ded56e4050a6f8ae4abd8648e51ad4f4fdbeb1
-
SHA512
96526795104e472ebda08b18ed0434e704dfeb0f6f9b1bbe1be4455b21099cd7705d456ea4dfefda64bde48c9bc626d70027f2aff978efd3cd5a8c1a6853157e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-