General
-
Target
0850c7c1eea5fb99308dc7d89cd47d434aa726b6231ff355ec21e13e1fc8d939
-
Size
1.3MB
-
Sample
221101-tx8k5sdde3
-
MD5
e51bed49c9dbd8d5ed6135599c2e75bb
-
SHA1
26e14583a1b17aeb00d0c6cecab2476c6273d83a
-
SHA256
0850c7c1eea5fb99308dc7d89cd47d434aa726b6231ff355ec21e13e1fc8d939
-
SHA512
876d7759849ae4c65bc1e11cd03c70ea84105ea26bad6359c328b7a2b3fa029ebeeb8ccdd187e32a1eb2a27c5a4aa1aa3e5db9cb9be885b8070b1c36db744e51
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
0850c7c1eea5fb99308dc7d89cd47d434aa726b6231ff355ec21e13e1fc8d939.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
0850c7c1eea5fb99308dc7d89cd47d434aa726b6231ff355ec21e13e1fc8d939
-
Size
1.3MB
-
MD5
e51bed49c9dbd8d5ed6135599c2e75bb
-
SHA1
26e14583a1b17aeb00d0c6cecab2476c6273d83a
-
SHA256
0850c7c1eea5fb99308dc7d89cd47d434aa726b6231ff355ec21e13e1fc8d939
-
SHA512
876d7759849ae4c65bc1e11cd03c70ea84105ea26bad6359c328b7a2b3fa029ebeeb8ccdd187e32a1eb2a27c5a4aa1aa3e5db9cb9be885b8070b1c36db744e51
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-