General
-
Target
0613bed846885728f91815b8889f54884e8ee31f3c7fc3286da96be74c8a2457
-
Size
1.3MB
-
Sample
221102-b5vedahcbk
-
MD5
1e16e6df37f68cce564b97ac18d146d4
-
SHA1
71c7fbd30d80e34fe63b05f52071b522d32e51e0
-
SHA256
0613bed846885728f91815b8889f54884e8ee31f3c7fc3286da96be74c8a2457
-
SHA512
e356d502733d4cb18bf4f492e498f3ee1fb4bfc0862e7e20c8af4b72b875de83665783f5826813ab7c675f5ade84526b511b4e267292dd9b03fcfec17abcb493
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
0613bed846885728f91815b8889f54884e8ee31f3c7fc3286da96be74c8a2457.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
0613bed846885728f91815b8889f54884e8ee31f3c7fc3286da96be74c8a2457
-
Size
1.3MB
-
MD5
1e16e6df37f68cce564b97ac18d146d4
-
SHA1
71c7fbd30d80e34fe63b05f52071b522d32e51e0
-
SHA256
0613bed846885728f91815b8889f54884e8ee31f3c7fc3286da96be74c8a2457
-
SHA512
e356d502733d4cb18bf4f492e498f3ee1fb4bfc0862e7e20c8af4b72b875de83665783f5826813ab7c675f5ade84526b511b4e267292dd9b03fcfec17abcb493
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-