General
-
Target
f8539f6cabbf59f15f6e0f2abb329fe87591720a66238331b97d09c380dc4963
-
Size
1.3MB
-
Sample
221101-v6lneadhb9
-
MD5
8ce499122a99db7b2d51a4ebac54bf63
-
SHA1
c0c7978d4e9ed2532458dc87584eede84f183614
-
SHA256
f8539f6cabbf59f15f6e0f2abb329fe87591720a66238331b97d09c380dc4963
-
SHA512
ba4d387b7d0fb34abf56f3b071d1c7dd596c93f1456d061a062a9affc970cfbd69e319adf72accd842d825912964ba013f2bd2a6deabb1a3cee0273e727d0b61
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
f8539f6cabbf59f15f6e0f2abb329fe87591720a66238331b97d09c380dc4963.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
f8539f6cabbf59f15f6e0f2abb329fe87591720a66238331b97d09c380dc4963
-
Size
1.3MB
-
MD5
8ce499122a99db7b2d51a4ebac54bf63
-
SHA1
c0c7978d4e9ed2532458dc87584eede84f183614
-
SHA256
f8539f6cabbf59f15f6e0f2abb329fe87591720a66238331b97d09c380dc4963
-
SHA512
ba4d387b7d0fb34abf56f3b071d1c7dd596c93f1456d061a062a9affc970cfbd69e319adf72accd842d825912964ba013f2bd2a6deabb1a3cee0273e727d0b61
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-