General
-
Target
f6506fa23e616a8c85f6c5ce7b1f5ccd814b2404794cba30e8fe80016b516d62
-
Size
1.3MB
-
Sample
221101-sk3npachf7
-
MD5
a074082917e812b308a8a845e5a3a6d9
-
SHA1
f775cb6dd9c54d05014e80366207dad374751366
-
SHA256
f6506fa23e616a8c85f6c5ce7b1f5ccd814b2404794cba30e8fe80016b516d62
-
SHA512
be6734325ac6a46d5abed0f45c2fdcabfa509d5d6ac2ef949a3a3856f3a93512243009c7d24b4d95a7cb5e0758c67b4e195700519d72a703e9f0383ebcafbebc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
f6506fa23e616a8c85f6c5ce7b1f5ccd814b2404794cba30e8fe80016b516d62.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
f6506fa23e616a8c85f6c5ce7b1f5ccd814b2404794cba30e8fe80016b516d62
-
Size
1.3MB
-
MD5
a074082917e812b308a8a845e5a3a6d9
-
SHA1
f775cb6dd9c54d05014e80366207dad374751366
-
SHA256
f6506fa23e616a8c85f6c5ce7b1f5ccd814b2404794cba30e8fe80016b516d62
-
SHA512
be6734325ac6a46d5abed0f45c2fdcabfa509d5d6ac2ef949a3a3856f3a93512243009c7d24b4d95a7cb5e0758c67b4e195700519d72a703e9f0383ebcafbebc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-