General
-
Target
602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c
-
Size
1.3MB
-
Sample
221101-s963eaeaep
-
MD5
8f2d25b0c003534f30a2b3a42ebb56b4
-
SHA1
93dc46fda102820f8402b2e1f41e295f4d0d4768
-
SHA256
602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c
-
SHA512
53d46909cc1f5710209c5c0839d1c40393eb3e9c4a8323d7eda08bfcc0ffaa8186cd554a88c1b0437962fd9b8018e0c5e2a1841780f41781dced9b9228dd6f49
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c
-
Size
1.3MB
-
MD5
8f2d25b0c003534f30a2b3a42ebb56b4
-
SHA1
93dc46fda102820f8402b2e1f41e295f4d0d4768
-
SHA256
602b52d379f25884af77e4b32a0cb90c691b46e87995a6e7321c5efe3a2d086c
-
SHA512
53d46909cc1f5710209c5c0839d1c40393eb3e9c4a8323d7eda08bfcc0ffaa8186cd554a88c1b0437962fd9b8018e0c5e2a1841780f41781dced9b9228dd6f49
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-