General
-
Target
e8f25430c54529115e63394defb927444666d05e6d2a2aaf15bfcc1167a70467
-
Size
1.3MB
-
Sample
221101-kkr8ysaffp
-
MD5
cd52934e834baa2c9a06936cf62a4a5f
-
SHA1
13c2aa93ca1cf504b1cfa7598a406b7dc68ef0a7
-
SHA256
e8f25430c54529115e63394defb927444666d05e6d2a2aaf15bfcc1167a70467
-
SHA512
570e91ca294acec569e007de798d11b56583a74b45fc755962a3d4338b25ee3c341991ac4b710b3266780995ba527239700f97870c5ca74f1ded4c72afda5e50
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
e8f25430c54529115e63394defb927444666d05e6d2a2aaf15bfcc1167a70467.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
e8f25430c54529115e63394defb927444666d05e6d2a2aaf15bfcc1167a70467
-
Size
1.3MB
-
MD5
cd52934e834baa2c9a06936cf62a4a5f
-
SHA1
13c2aa93ca1cf504b1cfa7598a406b7dc68ef0a7
-
SHA256
e8f25430c54529115e63394defb927444666d05e6d2a2aaf15bfcc1167a70467
-
SHA512
570e91ca294acec569e007de798d11b56583a74b45fc755962a3d4338b25ee3c341991ac4b710b3266780995ba527239700f97870c5ca74f1ded4c72afda5e50
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-