General
-
Target
099f193ae7ddc90645efd6cf0e6ac01e571baeb31ee3ae1298567d4976cb22b2
-
Size
1.3MB
-
Sample
221101-lftrnaace4
-
MD5
06cd04557fc3166b27de08fa647c1231
-
SHA1
4a8c53e9c6e039c497cfe3135042eaefda1a3cef
-
SHA256
099f193ae7ddc90645efd6cf0e6ac01e571baeb31ee3ae1298567d4976cb22b2
-
SHA512
52e81347c0796cdfc622fabd7c37543f2179bce3a03f3ae577416c954e5f29f48bcb1ca05d50dc7dbb994fd872821ea0714aa499a38a194629c68fca1f7ea47d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
099f193ae7ddc90645efd6cf0e6ac01e571baeb31ee3ae1298567d4976cb22b2.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
099f193ae7ddc90645efd6cf0e6ac01e571baeb31ee3ae1298567d4976cb22b2
-
Size
1.3MB
-
MD5
06cd04557fc3166b27de08fa647c1231
-
SHA1
4a8c53e9c6e039c497cfe3135042eaefda1a3cef
-
SHA256
099f193ae7ddc90645efd6cf0e6ac01e571baeb31ee3ae1298567d4976cb22b2
-
SHA512
52e81347c0796cdfc622fabd7c37543f2179bce3a03f3ae577416c954e5f29f48bcb1ca05d50dc7dbb994fd872821ea0714aa499a38a194629c68fca1f7ea47d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-