General
-
Target
bb24b6142862f08aec4dc7e56931eae1fb63e25d133645173c7283a800f73113
-
Size
1.3MB
-
Sample
221101-eb8axsgfgk
-
MD5
dd66a514389363397f7d180cfa6a055d
-
SHA1
cd28d43ecf837ceb39bef89eac9854413486f23f
-
SHA256
bb24b6142862f08aec4dc7e56931eae1fb63e25d133645173c7283a800f73113
-
SHA512
2ae040ceddd28020aba61b49c5542263707dba6ec9a5231c1d7b7ea5e9f0c037e8e4cf7981e96a7af959263ad06d7f0f155822536e4495461c92b945a0d2becc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
bb24b6142862f08aec4dc7e56931eae1fb63e25d133645173c7283a800f73113.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
bb24b6142862f08aec4dc7e56931eae1fb63e25d133645173c7283a800f73113
-
Size
1.3MB
-
MD5
dd66a514389363397f7d180cfa6a055d
-
SHA1
cd28d43ecf837ceb39bef89eac9854413486f23f
-
SHA256
bb24b6142862f08aec4dc7e56931eae1fb63e25d133645173c7283a800f73113
-
SHA512
2ae040ceddd28020aba61b49c5542263707dba6ec9a5231c1d7b7ea5e9f0c037e8e4cf7981e96a7af959263ad06d7f0f155822536e4495461c92b945a0d2becc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-