General
-
Target
d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46
-
Size
1.3MB
-
Sample
221101-wpt4wsehcp
-
MD5
cb2c48182558b9ad18c036a9e00b2278
-
SHA1
1bef10a869e7734a72b9654e15e686053966b5af
-
SHA256
d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46
-
SHA512
5f7d026fda453e398529fbdb00f2cf9e19547a78994197510ef70d850ee87ce4b8bcfd4ebe79c88eece4c3328ff8080cbce10e15853bfa94cb381dc36990ba97
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46
-
Size
1.3MB
-
MD5
cb2c48182558b9ad18c036a9e00b2278
-
SHA1
1bef10a869e7734a72b9654e15e686053966b5af
-
SHA256
d479544bb530952eccfce8efa3fa125170002a2e0b4ad90fffaa3c01fd622e46
-
SHA512
5f7d026fda453e398529fbdb00f2cf9e19547a78994197510ef70d850ee87ce4b8bcfd4ebe79c88eece4c3328ff8080cbce10e15853bfa94cb381dc36990ba97
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-