General
-
Target
8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0
-
Size
1.3MB
-
Sample
221101-yp8y6afdhn
-
MD5
d9d752cbbabfd56833c8d416e21be396
-
SHA1
25ec9b81096098a3ccb6f37155da5ed634ee0af1
-
SHA256
8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0
-
SHA512
ddf7eb467e69703e16ffc33d73ce27a395aca979d6f443acb45b8e6b030d460bd0f1f170bd424d230ce7e73f0be602ac481f2a9c0f59fb9a9d198f33a0ead3a4
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0
-
Size
1.3MB
-
MD5
d9d752cbbabfd56833c8d416e21be396
-
SHA1
25ec9b81096098a3ccb6f37155da5ed634ee0af1
-
SHA256
8a2d40130ed097011c8f7a054751f85d431d3b6ee4d2f46fb24b488901b3fec0
-
SHA512
ddf7eb467e69703e16ffc33d73ce27a395aca979d6f443acb45b8e6b030d460bd0f1f170bd424d230ce7e73f0be602ac481f2a9c0f59fb9a9d198f33a0ead3a4
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-