General
-
Target
ef04e639f3be87a95e31fad75b1c1125c4eae666cff1cae21b3f68e12ebfa4b0
-
Size
1.3MB
-
Sample
221101-vbshgaedel
-
MD5
356af3cc852ed6aba6b37cf607153ddf
-
SHA1
c5f1cb3b173fa21984fa41e99a5a3dbd30097287
-
SHA256
ef04e639f3be87a95e31fad75b1c1125c4eae666cff1cae21b3f68e12ebfa4b0
-
SHA512
2135f1ffd2fcc9932000edcaeaae68958f6fceeba92dcb25faaee0980fd69ef0f4b3d6e78fd81b3e8d39af107a33a50a49f7148b9f3e0157a59bc3fde2e62fd7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
ef04e639f3be87a95e31fad75b1c1125c4eae666cff1cae21b3f68e12ebfa4b0.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
ef04e639f3be87a95e31fad75b1c1125c4eae666cff1cae21b3f68e12ebfa4b0
-
Size
1.3MB
-
MD5
356af3cc852ed6aba6b37cf607153ddf
-
SHA1
c5f1cb3b173fa21984fa41e99a5a3dbd30097287
-
SHA256
ef04e639f3be87a95e31fad75b1c1125c4eae666cff1cae21b3f68e12ebfa4b0
-
SHA512
2135f1ffd2fcc9932000edcaeaae68958f6fceeba92dcb25faaee0980fd69ef0f4b3d6e78fd81b3e8d39af107a33a50a49f7148b9f3e0157a59bc3fde2e62fd7
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-