General
-
Target
da3d80661cc41e585b2a8709fbbb7ea5fc11ec0b41da15ce6aad5186f4e83a9c
-
Size
1.3MB
-
Sample
221101-fd3nwshahn
-
MD5
938d47506e9678c48a7dec80464f681b
-
SHA1
bcf438453defd03ddaa0efea18dc406ab23f193a
-
SHA256
da3d80661cc41e585b2a8709fbbb7ea5fc11ec0b41da15ce6aad5186f4e83a9c
-
SHA512
75202d0250b997a13b163e3add778cfba77dc87b9098154e97d21e694ca9856317b6c839c780fc0fa2e6ba2173297306e9792e33abf99f52dc53050af6beda79
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
da3d80661cc41e585b2a8709fbbb7ea5fc11ec0b41da15ce6aad5186f4e83a9c.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
da3d80661cc41e585b2a8709fbbb7ea5fc11ec0b41da15ce6aad5186f4e83a9c
-
Size
1.3MB
-
MD5
938d47506e9678c48a7dec80464f681b
-
SHA1
bcf438453defd03ddaa0efea18dc406ab23f193a
-
SHA256
da3d80661cc41e585b2a8709fbbb7ea5fc11ec0b41da15ce6aad5186f4e83a9c
-
SHA512
75202d0250b997a13b163e3add778cfba77dc87b9098154e97d21e694ca9856317b6c839c780fc0fa2e6ba2173297306e9792e33abf99f52dc53050af6beda79
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-