General
-
Target
01460e9be3dd2b9a12e275379773864338227d9e45c441e6bc6a9f559828b24d
-
Size
1.3MB
-
Sample
221101-yxlhtsfeel
-
MD5
77f96413aa8f5bfca5f0d9976e1e95e0
-
SHA1
34d4ec77a969be076a132820957367c44c4ab51c
-
SHA256
01460e9be3dd2b9a12e275379773864338227d9e45c441e6bc6a9f559828b24d
-
SHA512
204a2862c7199c280614c4c33da62357487fb0f46fdf0e1a9baf4611242a80ad44f8045dfd4ac112bf0213a9756c1fff9e07a42887a86dc6782fd2227a4a1dcb
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
01460e9be3dd2b9a12e275379773864338227d9e45c441e6bc6a9f559828b24d.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
01460e9be3dd2b9a12e275379773864338227d9e45c441e6bc6a9f559828b24d
-
Size
1.3MB
-
MD5
77f96413aa8f5bfca5f0d9976e1e95e0
-
SHA1
34d4ec77a969be076a132820957367c44c4ab51c
-
SHA256
01460e9be3dd2b9a12e275379773864338227d9e45c441e6bc6a9f559828b24d
-
SHA512
204a2862c7199c280614c4c33da62357487fb0f46fdf0e1a9baf4611242a80ad44f8045dfd4ac112bf0213a9756c1fff9e07a42887a86dc6782fd2227a4a1dcb
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-