General
-
Target
d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa
-
Size
1.3MB
-
Sample
221101-ml3gesbhbk
-
MD5
a3d95e75d5a46fd397e8636314fafb63
-
SHA1
b603e3bde613faef6079d75e352abcf19d807cf2
-
SHA256
d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa
-
SHA512
36089c386fa6a28dab53141f5f617048e14e65e68175ca39dba192512f72e279e2290d23011b8eabc9c8a06e026214077c7145c85d68a34fbd30e7228b32b582
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa
-
Size
1.3MB
-
MD5
a3d95e75d5a46fd397e8636314fafb63
-
SHA1
b603e3bde613faef6079d75e352abcf19d807cf2
-
SHA256
d74f50a5a85cd6a92c1efb2c08735c929292eaefedf9884ce7e289cfab8d7afa
-
SHA512
36089c386fa6a28dab53141f5f617048e14e65e68175ca39dba192512f72e279e2290d23011b8eabc9c8a06e026214077c7145c85d68a34fbd30e7228b32b582
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-