General
-
Target
81336321ea12f64cf0e9c3fa7fb7c012ee9eb1de4db38e34900cce58d7d82e96
-
Size
1.3MB
-
Sample
221101-pr7z7sbhf7
-
MD5
8925c71def183904f97961d7e4afe159
-
SHA1
d6988c902c224e558dc93e0170affe62d3d735ec
-
SHA256
81336321ea12f64cf0e9c3fa7fb7c012ee9eb1de4db38e34900cce58d7d82e96
-
SHA512
ad2a6667df942c40cbbf941e28f1c40cb7a42ad4596c8062b6f09f33e21bd9346a840070d17f7847d35d2cc27f3d1cedf97822421c43a20930424356206d3b7d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
81336321ea12f64cf0e9c3fa7fb7c012ee9eb1de4db38e34900cce58d7d82e96.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
81336321ea12f64cf0e9c3fa7fb7c012ee9eb1de4db38e34900cce58d7d82e96
-
Size
1.3MB
-
MD5
8925c71def183904f97961d7e4afe159
-
SHA1
d6988c902c224e558dc93e0170affe62d3d735ec
-
SHA256
81336321ea12f64cf0e9c3fa7fb7c012ee9eb1de4db38e34900cce58d7d82e96
-
SHA512
ad2a6667df942c40cbbf941e28f1c40cb7a42ad4596c8062b6f09f33e21bd9346a840070d17f7847d35d2cc27f3d1cedf97822421c43a20930424356206d3b7d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-