General
-
Target
d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524
-
Size
1.3MB
-
Sample
221101-mwqklscabj
-
MD5
fb7aef145d8187ac9efd6cbba7d156a7
-
SHA1
d59f20d2565a41723aa5260295c6ca6ea18fedfa
-
SHA256
d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524
-
SHA512
be88031dadd166fb517ea94b8ebd741c7eb7be566174e391aaef4bd074fbbe71e079e1f0f4e516b1cab9d62910652fafc3468fd90e79c041372e41aeff635393
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524
-
Size
1.3MB
-
MD5
fb7aef145d8187ac9efd6cbba7d156a7
-
SHA1
d59f20d2565a41723aa5260295c6ca6ea18fedfa
-
SHA256
d60419ff1324beae116230db949c014624b95a80dff810433ddd5700385b4524
-
SHA512
be88031dadd166fb517ea94b8ebd741c7eb7be566174e391aaef4bd074fbbe71e079e1f0f4e516b1cab9d62910652fafc3468fd90e79c041372e41aeff635393
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-