General
-
Target
7f5497f0b7b0b2b6d24182fd71e10cf1336738c5f46ffc1db8e107dd6a4590d5
-
Size
1.3MB
-
Sample
221101-c56yvafda9
-
MD5
8584f653e96ecb508539b60a1f932fbf
-
SHA1
76c312e37c32c93a2379f71fde6e56a4d310c742
-
SHA256
7f5497f0b7b0b2b6d24182fd71e10cf1336738c5f46ffc1db8e107dd6a4590d5
-
SHA512
00331b14f73af4ca26f83f3d0d5e21e5fca5cc12234ded7168fce777547164f5126b58467a788d19135de959661fce9bf657136c06c0720a35066ac239042c53
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
7f5497f0b7b0b2b6d24182fd71e10cf1336738c5f46ffc1db8e107dd6a4590d5.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
7f5497f0b7b0b2b6d24182fd71e10cf1336738c5f46ffc1db8e107dd6a4590d5
-
Size
1.3MB
-
MD5
8584f653e96ecb508539b60a1f932fbf
-
SHA1
76c312e37c32c93a2379f71fde6e56a4d310c742
-
SHA256
7f5497f0b7b0b2b6d24182fd71e10cf1336738c5f46ffc1db8e107dd6a4590d5
-
SHA512
00331b14f73af4ca26f83f3d0d5e21e5fca5cc12234ded7168fce777547164f5126b58467a788d19135de959661fce9bf657136c06c0720a35066ac239042c53
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-