General
-
Target
1cb94d62f36b3cdfdca218357a97ea7f18c8cb30f23ebd5ce48829de307e5cb0
-
Size
1.3MB
-
Sample
221101-m2t5zscafp
-
MD5
2bf5ded74815089d4f57b99a454ceabf
-
SHA1
cfd8b3fe4016e715b808444c7019d1d8a64b1da8
-
SHA256
1cb94d62f36b3cdfdca218357a97ea7f18c8cb30f23ebd5ce48829de307e5cb0
-
SHA512
cdbc34228098688772de5d430a54c9857a11e04318f82b118b7a605e00c84581c42752969135c0f0d7949c7f38057abe428bbe70010ffbfcf3f33db5dae4d845
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
1cb94d62f36b3cdfdca218357a97ea7f18c8cb30f23ebd5ce48829de307e5cb0.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
1cb94d62f36b3cdfdca218357a97ea7f18c8cb30f23ebd5ce48829de307e5cb0
-
Size
1.3MB
-
MD5
2bf5ded74815089d4f57b99a454ceabf
-
SHA1
cfd8b3fe4016e715b808444c7019d1d8a64b1da8
-
SHA256
1cb94d62f36b3cdfdca218357a97ea7f18c8cb30f23ebd5ce48829de307e5cb0
-
SHA512
cdbc34228098688772de5d430a54c9857a11e04318f82b118b7a605e00c84581c42752969135c0f0d7949c7f38057abe428bbe70010ffbfcf3f33db5dae4d845
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-