General
-
Target
91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df
-
Size
1.3MB
-
Sample
221101-t6pjmaedbm
-
MD5
58aed10f970dc6f7f6d8a59feee6aa17
-
SHA1
6e957e48eeb1dcf45b2d1a83c6dccf3f2fe93994
-
SHA256
91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df
-
SHA512
8c5cda14ab9854f57d003f89455a0e76f1f2c2afe321e8cdbfa7405820bbda6c9d70f2b03a998aa12a55a3f6107ec803370a142401a6345abddc12b9ff16d2f7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df
-
Size
1.3MB
-
MD5
58aed10f970dc6f7f6d8a59feee6aa17
-
SHA1
6e957e48eeb1dcf45b2d1a83c6dccf3f2fe93994
-
SHA256
91308f2f31d57a38ce13e7e2272fa4dfb82ee96fe6c2cb6dacb455828f85f7df
-
SHA512
8c5cda14ab9854f57d003f89455a0e76f1f2c2afe321e8cdbfa7405820bbda6c9d70f2b03a998aa12a55a3f6107ec803370a142401a6345abddc12b9ff16d2f7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-