General
-
Target
3cf572e51482070bbde8ffd0f38fcbbb466469b6501e0f1cb31c5ba40afc1203
-
Size
1.3MB
-
Sample
221101-jbkbbaabdq
-
MD5
79e935fa0dac1259ceaec5f5160fa4c1
-
SHA1
86ef07ee64dc0e69f3935a8ab4908e7559ab5409
-
SHA256
3cf572e51482070bbde8ffd0f38fcbbb466469b6501e0f1cb31c5ba40afc1203
-
SHA512
6acaab9d31dfea84585874b721cad1f3378b052bf14735636d0c14a65d8dc473858e7ea98c89cd82871408010bdcb54c290cd6cbd405363b7b52d8bdce8fb2cd
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
3cf572e51482070bbde8ffd0f38fcbbb466469b6501e0f1cb31c5ba40afc1203.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
3cf572e51482070bbde8ffd0f38fcbbb466469b6501e0f1cb31c5ba40afc1203
-
Size
1.3MB
-
MD5
79e935fa0dac1259ceaec5f5160fa4c1
-
SHA1
86ef07ee64dc0e69f3935a8ab4908e7559ab5409
-
SHA256
3cf572e51482070bbde8ffd0f38fcbbb466469b6501e0f1cb31c5ba40afc1203
-
SHA512
6acaab9d31dfea84585874b721cad1f3378b052bf14735636d0c14a65d8dc473858e7ea98c89cd82871408010bdcb54c290cd6cbd405363b7b52d8bdce8fb2cd
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-