General
-
Target
e482ffd50a7fed7c3b19b8c372ead68a17c233f73ef0eb30d6bacf45792e1065
-
Size
1.3MB
-
Sample
221101-z9bd3agacl
-
MD5
192d17fe0365d2c21324a52475ce35b8
-
SHA1
43a67321fa2147e69dbe685490677b7f40a82b8e
-
SHA256
e482ffd50a7fed7c3b19b8c372ead68a17c233f73ef0eb30d6bacf45792e1065
-
SHA512
acb845f840965ff1c2d20bfcc0e4c91f88fb8d4c2477cae07675df494d2d2f287b7587171bdeda0808334ea93f97813084f95f6bda425e3709cf3a360e119b09
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
e482ffd50a7fed7c3b19b8c372ead68a17c233f73ef0eb30d6bacf45792e1065.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
e482ffd50a7fed7c3b19b8c372ead68a17c233f73ef0eb30d6bacf45792e1065
-
Size
1.3MB
-
MD5
192d17fe0365d2c21324a52475ce35b8
-
SHA1
43a67321fa2147e69dbe685490677b7f40a82b8e
-
SHA256
e482ffd50a7fed7c3b19b8c372ead68a17c233f73ef0eb30d6bacf45792e1065
-
SHA512
acb845f840965ff1c2d20bfcc0e4c91f88fb8d4c2477cae07675df494d2d2f287b7587171bdeda0808334ea93f97813084f95f6bda425e3709cf3a360e119b09
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-