General
-
Target
696f6622acfde6a0bf56cff95b3a1a2f96a31544776c46316ef4ce0865cd1bb6
-
Size
1.3MB
-
Sample
221101-ppqyxabhd8
-
MD5
84d090bbd78bcc89e347599488ad54e8
-
SHA1
1e4f71e7d625c6c2c6a1cec928a5941bd680449c
-
SHA256
696f6622acfde6a0bf56cff95b3a1a2f96a31544776c46316ef4ce0865cd1bb6
-
SHA512
5df3bc58aa8a999d67e718e0cfff45d4cc48c1ee4f513c68809a882d8d4acc5cea1a72df8f4a2c175b025491161bab3914372bbc168d533604d5e7b5a7e4684e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
696f6622acfde6a0bf56cff95b3a1a2f96a31544776c46316ef4ce0865cd1bb6.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
696f6622acfde6a0bf56cff95b3a1a2f96a31544776c46316ef4ce0865cd1bb6
-
Size
1.3MB
-
MD5
84d090bbd78bcc89e347599488ad54e8
-
SHA1
1e4f71e7d625c6c2c6a1cec928a5941bd680449c
-
SHA256
696f6622acfde6a0bf56cff95b3a1a2f96a31544776c46316ef4ce0865cd1bb6
-
SHA512
5df3bc58aa8a999d67e718e0cfff45d4cc48c1ee4f513c68809a882d8d4acc5cea1a72df8f4a2c175b025491161bab3914372bbc168d533604d5e7b5a7e4684e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-