General
-
Target
b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804
-
Size
1.3MB
-
Sample
221101-khs3gaafck
-
MD5
123b77cbdba6713ae0c268f1f5ea0e0a
-
SHA1
587e9af6c8badcd157bd276fe16eb150686c1667
-
SHA256
b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804
-
SHA512
ad27ef0a6557c7f93419179759bc3708fb6fd0570c2b8f79db973f40880c5fa1ee2057a6513b4b0b43302efa41483ec5d41fac5f7606a60182f01ac4568a07f2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804
-
Size
1.3MB
-
MD5
123b77cbdba6713ae0c268f1f5ea0e0a
-
SHA1
587e9af6c8badcd157bd276fe16eb150686c1667
-
SHA256
b74eebc0edfca32e67d40f3772e28a95547c52438ba0f4177ff0545a67665804
-
SHA512
ad27ef0a6557c7f93419179759bc3708fb6fd0570c2b8f79db973f40880c5fa1ee2057a6513b4b0b43302efa41483ec5d41fac5f7606a60182f01ac4568a07f2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-