General
-
Target
5a6e7759b99a8c9d6e688017d9d4544eaba8fa1ba2b02826b35d3167c64c4e96
-
Size
1.3MB
-
Sample
221101-cb6qzsfag9
-
MD5
f474b03f42b80f95e2b1b0cc53055fa6
-
SHA1
cb57da177abe27daa042732cd39c2e9626eb2439
-
SHA256
5a6e7759b99a8c9d6e688017d9d4544eaba8fa1ba2b02826b35d3167c64c4e96
-
SHA512
e082259410eb61a75b9275a15d6c6ba1dd2236dd7e07f781673ff144ab3e973f76be2f9e01a0de2e27b77c462e4ba719e0deca689413af7279c9aebff3be5c1e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
5a6e7759b99a8c9d6e688017d9d4544eaba8fa1ba2b02826b35d3167c64c4e96.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
5a6e7759b99a8c9d6e688017d9d4544eaba8fa1ba2b02826b35d3167c64c4e96
-
Size
1.3MB
-
MD5
f474b03f42b80f95e2b1b0cc53055fa6
-
SHA1
cb57da177abe27daa042732cd39c2e9626eb2439
-
SHA256
5a6e7759b99a8c9d6e688017d9d4544eaba8fa1ba2b02826b35d3167c64c4e96
-
SHA512
e082259410eb61a75b9275a15d6c6ba1dd2236dd7e07f781673ff144ab3e973f76be2f9e01a0de2e27b77c462e4ba719e0deca689413af7279c9aebff3be5c1e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-