General
-
Target
3eeb16edab47d310ea2ed9c505b08848fe0967590305922f317f6a86bdfc43ae
-
Size
1.3MB
-
Sample
221101-ma8t3abfel
-
MD5
8e113e8cf2c8879d559f5a9c08bc2865
-
SHA1
85d223333f423bed1e59430099f994daa9b576b2
-
SHA256
3eeb16edab47d310ea2ed9c505b08848fe0967590305922f317f6a86bdfc43ae
-
SHA512
4bf48d0b8982c3b0c7c6f7a62696a9b7ff9d070dd33075be1163d177f21e3f1f3f497403cc21f4b8ca25b1b2aa85dbfd71f2410ec6120c1cb2b6efa12d3509e5
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
3eeb16edab47d310ea2ed9c505b08848fe0967590305922f317f6a86bdfc43ae.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
3eeb16edab47d310ea2ed9c505b08848fe0967590305922f317f6a86bdfc43ae
-
Size
1.3MB
-
MD5
8e113e8cf2c8879d559f5a9c08bc2865
-
SHA1
85d223333f423bed1e59430099f994daa9b576b2
-
SHA256
3eeb16edab47d310ea2ed9c505b08848fe0967590305922f317f6a86bdfc43ae
-
SHA512
4bf48d0b8982c3b0c7c6f7a62696a9b7ff9d070dd33075be1163d177f21e3f1f3f497403cc21f4b8ca25b1b2aa85dbfd71f2410ec6120c1cb2b6efa12d3509e5
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-