General
-
Target
f716931b4b144dedf370a505230b004da77b2f22f9ea862a5a39fcbc04576cc2
-
Size
1.3MB
-
Sample
221101-jhhfasacaq
-
MD5
d8fa7091b6aa503ec12f4655c4d993b0
-
SHA1
6b1f5379c8dd1eea3ab9ce864f80e488c3b4244b
-
SHA256
f716931b4b144dedf370a505230b004da77b2f22f9ea862a5a39fcbc04576cc2
-
SHA512
0638e7ff2030ee8ea55af03f881316336dd513ad714f180c30cd18b5821e2b51ae7b81cc2e5be2e99177c0eb81d50e40b2ec412e50c66176855fb535281da827
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
f716931b4b144dedf370a505230b004da77b2f22f9ea862a5a39fcbc04576cc2.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
f716931b4b144dedf370a505230b004da77b2f22f9ea862a5a39fcbc04576cc2
-
Size
1.3MB
-
MD5
d8fa7091b6aa503ec12f4655c4d993b0
-
SHA1
6b1f5379c8dd1eea3ab9ce864f80e488c3b4244b
-
SHA256
f716931b4b144dedf370a505230b004da77b2f22f9ea862a5a39fcbc04576cc2
-
SHA512
0638e7ff2030ee8ea55af03f881316336dd513ad714f180c30cd18b5821e2b51ae7b81cc2e5be2e99177c0eb81d50e40b2ec412e50c66176855fb535281da827
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-