General
-
Target
b98d6de07f0c759d4e4607ee4151628af9f04f25e84d1ee5c7ca8db81dd15a5f
-
Size
1.3MB
-
Sample
221101-cfccyagaep
-
MD5
16fa4b52bbda6c2cfc912f8f2672d505
-
SHA1
736f640a7dbe267a2c9c9e33e5827b75c937e036
-
SHA256
b98d6de07f0c759d4e4607ee4151628af9f04f25e84d1ee5c7ca8db81dd15a5f
-
SHA512
ebe294cea23e493b9c03cfe6292af400a9c0d9da1b9c76bf7bc22c15eddfd21568fb5174adfe598028c5700e76c31559f8e7fcee96186f52521f39e9aeb71a7e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
b98d6de07f0c759d4e4607ee4151628af9f04f25e84d1ee5c7ca8db81dd15a5f.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
b98d6de07f0c759d4e4607ee4151628af9f04f25e84d1ee5c7ca8db81dd15a5f
-
Size
1.3MB
-
MD5
16fa4b52bbda6c2cfc912f8f2672d505
-
SHA1
736f640a7dbe267a2c9c9e33e5827b75c937e036
-
SHA256
b98d6de07f0c759d4e4607ee4151628af9f04f25e84d1ee5c7ca8db81dd15a5f
-
SHA512
ebe294cea23e493b9c03cfe6292af400a9c0d9da1b9c76bf7bc22c15eddfd21568fb5174adfe598028c5700e76c31559f8e7fcee96186f52521f39e9aeb71a7e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-