General
-
Target
a75715b600fb19ea3666eb9880fa379a75c8c9e99c4c291a04b6fe2201f260e9
-
Size
1.3MB
-
Sample
221101-f3mzqsgdc3
-
MD5
9c91fb64a830865d2a322ac8a153b131
-
SHA1
a88e17fd03377d47ab90a1c90320ae4405dc3fb0
-
SHA256
a75715b600fb19ea3666eb9880fa379a75c8c9e99c4c291a04b6fe2201f260e9
-
SHA512
a7560cedf85058b6f492d42f2117de7edf7bbf99d2bb7860aad9c17a18abff2944fd2bbf138bdb85ce017c0b3014cf60de2bc4cb74b56aec0035c19aa5381eca
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
a75715b600fb19ea3666eb9880fa379a75c8c9e99c4c291a04b6fe2201f260e9.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
a75715b600fb19ea3666eb9880fa379a75c8c9e99c4c291a04b6fe2201f260e9
-
Size
1.3MB
-
MD5
9c91fb64a830865d2a322ac8a153b131
-
SHA1
a88e17fd03377d47ab90a1c90320ae4405dc3fb0
-
SHA256
a75715b600fb19ea3666eb9880fa379a75c8c9e99c4c291a04b6fe2201f260e9
-
SHA512
a7560cedf85058b6f492d42f2117de7edf7bbf99d2bb7860aad9c17a18abff2944fd2bbf138bdb85ce017c0b3014cf60de2bc4cb74b56aec0035c19aa5381eca
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-