General
-
Target
ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca
-
Size
1.3MB
-
Sample
221101-nqcbgacdfj
-
MD5
bcae0da037173d4412426a37280f5b81
-
SHA1
8b412f5d09f1509eb637b43e5e476f336c8e5ff6
-
SHA256
ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca
-
SHA512
bf0b4fe136be815a323867be87190fc04aa8d6160dc4c34d493c90d881b1fd3e5b279799de34348ecac48153a094a73f5901258f4d8d4f1df0974def5e7fbc60
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca
-
Size
1.3MB
-
MD5
bcae0da037173d4412426a37280f5b81
-
SHA1
8b412f5d09f1509eb637b43e5e476f336c8e5ff6
-
SHA256
ad8e86f2d0ccf70256522f96fe0298227f998c89188e872268b3bd23460725ca
-
SHA512
bf0b4fe136be815a323867be87190fc04aa8d6160dc4c34d493c90d881b1fd3e5b279799de34348ecac48153a094a73f5901258f4d8d4f1df0974def5e7fbc60
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-