General
-
Target
87907908a43920ef4cd666aa7978831f8253c5ceadebd835102de90ee6ce4368
-
Size
1.3MB
-
Sample
221101-jywb4ahed2
-
MD5
1688f7eda68329150d3b786ed56dd32b
-
SHA1
be81966522800089b2ce26c191ca142a7e10dbb9
-
SHA256
87907908a43920ef4cd666aa7978831f8253c5ceadebd835102de90ee6ce4368
-
SHA512
1447837c15dab8149d2d0f33afc742f6e60c1ac8753568b9d410953b0db578129a9982844a8773f96bc7cadfd43a81b845bdae9d9acbaec1c90f7e2f7096d599
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
87907908a43920ef4cd666aa7978831f8253c5ceadebd835102de90ee6ce4368.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
87907908a43920ef4cd666aa7978831f8253c5ceadebd835102de90ee6ce4368
-
Size
1.3MB
-
MD5
1688f7eda68329150d3b786ed56dd32b
-
SHA1
be81966522800089b2ce26c191ca142a7e10dbb9
-
SHA256
87907908a43920ef4cd666aa7978831f8253c5ceadebd835102de90ee6ce4368
-
SHA512
1447837c15dab8149d2d0f33afc742f6e60c1ac8753568b9d410953b0db578129a9982844a8773f96bc7cadfd43a81b845bdae9d9acbaec1c90f7e2f7096d599
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-