General
-
Target
24fa4154c54080fa19bb99c47d423008576e68d8e3df5b856545d0e932e3dbd2
-
Size
1.3MB
-
Sample
221101-jlbf6ahdd9
-
MD5
4ff69162a701b0d6af65de553a5be36a
-
SHA1
713e0d4b9e0c0d2c8466ad330c36708aeb47f5be
-
SHA256
24fa4154c54080fa19bb99c47d423008576e68d8e3df5b856545d0e932e3dbd2
-
SHA512
d9f72ac9b6ffc1dd8ad7b9516ba6832ebd1d45a2d24892bdd319635473ef148426aa8a06e1eb40c197066b0fa997ba0d9d84c5dba4d90ea5616e135fa289b596
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
24fa4154c54080fa19bb99c47d423008576e68d8e3df5b856545d0e932e3dbd2.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
24fa4154c54080fa19bb99c47d423008576e68d8e3df5b856545d0e932e3dbd2
-
Size
1.3MB
-
MD5
4ff69162a701b0d6af65de553a5be36a
-
SHA1
713e0d4b9e0c0d2c8466ad330c36708aeb47f5be
-
SHA256
24fa4154c54080fa19bb99c47d423008576e68d8e3df5b856545d0e932e3dbd2
-
SHA512
d9f72ac9b6ffc1dd8ad7b9516ba6832ebd1d45a2d24892bdd319635473ef148426aa8a06e1eb40c197066b0fa997ba0d9d84c5dba4d90ea5616e135fa289b596
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-