General
-
Target
2d6acb9bb5e27b3a02f04358a44b9babd5a7546da1c085c352b89d6eefbe3c91
-
Size
1.3MB
-
Sample
221101-w3e7wsehhk
-
MD5
045fda10d48d3f61fbac429947850d8e
-
SHA1
957dc0e036ae24bfff66772a2517ad6e07548fd7
-
SHA256
2d6acb9bb5e27b3a02f04358a44b9babd5a7546da1c085c352b89d6eefbe3c91
-
SHA512
82125e10f3f6cde659819e1745e6bacddd3e91712510041f2af7013296132868e6c99dfb4d08fcd150fd962a2465ca386f7ed3b3acb3886641581d4e1eaaf748
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
2d6acb9bb5e27b3a02f04358a44b9babd5a7546da1c085c352b89d6eefbe3c91.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
2d6acb9bb5e27b3a02f04358a44b9babd5a7546da1c085c352b89d6eefbe3c91
-
Size
1.3MB
-
MD5
045fda10d48d3f61fbac429947850d8e
-
SHA1
957dc0e036ae24bfff66772a2517ad6e07548fd7
-
SHA256
2d6acb9bb5e27b3a02f04358a44b9babd5a7546da1c085c352b89d6eefbe3c91
-
SHA512
82125e10f3f6cde659819e1745e6bacddd3e91712510041f2af7013296132868e6c99dfb4d08fcd150fd962a2465ca386f7ed3b3acb3886641581d4e1eaaf748
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-