General
-
Target
9086d7380f8b3c6f70ff786494f2354a739bd82af27424294bcc6dbca4c70c1c
-
Size
1.3MB
-
Sample
221101-hhehzahhfj
-
MD5
f30a0c1ef8d4254892b316587213add8
-
SHA1
3d9270bf88ce39f620ea83d6ff4a0b6a2ed6dfe0
-
SHA256
9086d7380f8b3c6f70ff786494f2354a739bd82af27424294bcc6dbca4c70c1c
-
SHA512
8a0176f0af6c5d32d0a28eb578395d5486808fdbd420ab5175147fa7fd058885d9f89ac6c06fa089c8a7dfc13a8d6213505f6d0d985b74c0c317c366df78fe02
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
9086d7380f8b3c6f70ff786494f2354a739bd82af27424294bcc6dbca4c70c1c.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
9086d7380f8b3c6f70ff786494f2354a739bd82af27424294bcc6dbca4c70c1c
-
Size
1.3MB
-
MD5
f30a0c1ef8d4254892b316587213add8
-
SHA1
3d9270bf88ce39f620ea83d6ff4a0b6a2ed6dfe0
-
SHA256
9086d7380f8b3c6f70ff786494f2354a739bd82af27424294bcc6dbca4c70c1c
-
SHA512
8a0176f0af6c5d32d0a28eb578395d5486808fdbd420ab5175147fa7fd058885d9f89ac6c06fa089c8a7dfc13a8d6213505f6d0d985b74c0c317c366df78fe02
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-