General
-
Target
8b464085acc812415dd79aeca9f7ad921febb88fb162ccaa152f2dc78c8a6cf9
-
Size
1.3MB
-
Sample
221101-s87bsaeadr
-
MD5
7f2cb0cb3c990e0d5ce817d64f52770e
-
SHA1
63527d784fa3a8ab5e484e70b6a11b84c95b4004
-
SHA256
8b464085acc812415dd79aeca9f7ad921febb88fb162ccaa152f2dc78c8a6cf9
-
SHA512
8f190f1306acda26b10b10e0b4c99f740027b19722247b527548e7d8a2ea31b03dd6efb1da1cf621f61d55f489054807c0582f1dcf6d30461e271fcf5d73a1da
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
8b464085acc812415dd79aeca9f7ad921febb88fb162ccaa152f2dc78c8a6cf9.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
8b464085acc812415dd79aeca9f7ad921febb88fb162ccaa152f2dc78c8a6cf9
-
Size
1.3MB
-
MD5
7f2cb0cb3c990e0d5ce817d64f52770e
-
SHA1
63527d784fa3a8ab5e484e70b6a11b84c95b4004
-
SHA256
8b464085acc812415dd79aeca9f7ad921febb88fb162ccaa152f2dc78c8a6cf9
-
SHA512
8f190f1306acda26b10b10e0b4c99f740027b19722247b527548e7d8a2ea31b03dd6efb1da1cf621f61d55f489054807c0582f1dcf6d30461e271fcf5d73a1da
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-