General
-
Target
d68fbfc9d14a5c925b5cf6c17f0a892849d076e4f0a13e05d220f407de41d64f
-
Size
1.3MB
-
Sample
221101-ny7scabfb9
-
MD5
02489664c80635abf6ba80fc143c4d30
-
SHA1
2666b55e42048510ed7888a65782ba0182973744
-
SHA256
d68fbfc9d14a5c925b5cf6c17f0a892849d076e4f0a13e05d220f407de41d64f
-
SHA512
b76a736bd7720a3071f24fa2f333a31e48fcf8dc2e39364802ad85f80f217977a4d6c7f8cca5e2f9fb5e42ea309cc68ad5e0b740c45cd1045a7c423ef930c699
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
d68fbfc9d14a5c925b5cf6c17f0a892849d076e4f0a13e05d220f407de41d64f.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
d68fbfc9d14a5c925b5cf6c17f0a892849d076e4f0a13e05d220f407de41d64f
-
Size
1.3MB
-
MD5
02489664c80635abf6ba80fc143c4d30
-
SHA1
2666b55e42048510ed7888a65782ba0182973744
-
SHA256
d68fbfc9d14a5c925b5cf6c17f0a892849d076e4f0a13e05d220f407de41d64f
-
SHA512
b76a736bd7720a3071f24fa2f333a31e48fcf8dc2e39364802ad85f80f217977a4d6c7f8cca5e2f9fb5e42ea309cc68ad5e0b740c45cd1045a7c423ef930c699
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-