General
-
Target
a4cbc28e74f953bcf71ca55247dd7cdf11f8357bb1d91855ce59696debebe02f
-
Size
1.3MB
-
Sample
221101-ms88jsbhhj
-
MD5
91f2e5e0e7214f4cc50fae1b8a41ed45
-
SHA1
7af0429167abb9040f980f6877f050776a6a9489
-
SHA256
a4cbc28e74f953bcf71ca55247dd7cdf11f8357bb1d91855ce59696debebe02f
-
SHA512
764454a12dc6acb3eb6e70212bcf95522db7d0889778be13b20fd82bb2c6a99254973bfabf61504df8d4c4ee95aac8021d402705939c362985ea5cf48aa2b7c2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
a4cbc28e74f953bcf71ca55247dd7cdf11f8357bb1d91855ce59696debebe02f.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
a4cbc28e74f953bcf71ca55247dd7cdf11f8357bb1d91855ce59696debebe02f
-
Size
1.3MB
-
MD5
91f2e5e0e7214f4cc50fae1b8a41ed45
-
SHA1
7af0429167abb9040f980f6877f050776a6a9489
-
SHA256
a4cbc28e74f953bcf71ca55247dd7cdf11f8357bb1d91855ce59696debebe02f
-
SHA512
764454a12dc6acb3eb6e70212bcf95522db7d0889778be13b20fd82bb2c6a99254973bfabf61504df8d4c4ee95aac8021d402705939c362985ea5cf48aa2b7c2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-