General
-
Target
06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736
-
Size
1.3MB
-
Sample
221101-dv23ksgefj
-
MD5
efa0f8d3b7e871a26271c75281d4fc0c
-
SHA1
0f3a1a6348ad9c32aaa16a92c7b4ff49d7c07faa
-
SHA256
06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736
-
SHA512
5cdd4756020b4ff995be449ea13b384ac6356b57a69c97615daf88f2a4150b5dd443c9a1acdf61ecf1a50e31ec37d7a87a7dee684c715c1ca1f22a75ff403cad
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736
-
Size
1.3MB
-
MD5
efa0f8d3b7e871a26271c75281d4fc0c
-
SHA1
0f3a1a6348ad9c32aaa16a92c7b4ff49d7c07faa
-
SHA256
06ad87467c46db2593dd0ed679d0ec6062fbdfd4bcd704b70af0d2d532ff5736
-
SHA512
5cdd4756020b4ff995be449ea13b384ac6356b57a69c97615daf88f2a4150b5dd443c9a1acdf61ecf1a50e31ec37d7a87a7dee684c715c1ca1f22a75ff403cad
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-