General
-
Target
5698885c45ae73b0f054437a8a79bfdf0013532edf0fe0da9d2624d084c4d576
-
Size
1.3MB
-
Sample
221102-1p1nwscae9
-
MD5
83363883cac437c93128fb5819c609f6
-
SHA1
9fc1756634280e9978364a42b725ae5cad49a940
-
SHA256
5698885c45ae73b0f054437a8a79bfdf0013532edf0fe0da9d2624d084c4d576
-
SHA512
04e3e3452870d9ccd046424f3e1a8b06b288eecbd4fe476029db62d78dd2982e11bca7a45f0c9a6ec9d983df48a4729466972aa07e848c04c049290973d0da61
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
5698885c45ae73b0f054437a8a79bfdf0013532edf0fe0da9d2624d084c4d576.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
5698885c45ae73b0f054437a8a79bfdf0013532edf0fe0da9d2624d084c4d576
-
Size
1.3MB
-
MD5
83363883cac437c93128fb5819c609f6
-
SHA1
9fc1756634280e9978364a42b725ae5cad49a940
-
SHA256
5698885c45ae73b0f054437a8a79bfdf0013532edf0fe0da9d2624d084c4d576
-
SHA512
04e3e3452870d9ccd046424f3e1a8b06b288eecbd4fe476029db62d78dd2982e11bca7a45f0c9a6ec9d983df48a4729466972aa07e848c04c049290973d0da61
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-