General
-
Target
1de317ce22efb6d8576f90aa6e64293f76bcc9c87966567b8932f60694c69c65
-
Size
1.3MB
-
Sample
221102-btv7jahbdn
-
MD5
7822abfa4e952ee1d3ce5f4c65c07a77
-
SHA1
5c344068d1e1ab84cd256330440df8348b60df84
-
SHA256
1de317ce22efb6d8576f90aa6e64293f76bcc9c87966567b8932f60694c69c65
-
SHA512
99c9b2eef5e4467aa6656e3c028774c7ce27cac80dc2d4680ca1877b9b248b0a65420a69baf5b92dfe3f011a0b32ff9cae799d4cb41cc974f5241cf005af5f78
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
1de317ce22efb6d8576f90aa6e64293f76bcc9c87966567b8932f60694c69c65.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
1de317ce22efb6d8576f90aa6e64293f76bcc9c87966567b8932f60694c69c65
-
Size
1.3MB
-
MD5
7822abfa4e952ee1d3ce5f4c65c07a77
-
SHA1
5c344068d1e1ab84cd256330440df8348b60df84
-
SHA256
1de317ce22efb6d8576f90aa6e64293f76bcc9c87966567b8932f60694c69c65
-
SHA512
99c9b2eef5e4467aa6656e3c028774c7ce27cac80dc2d4680ca1877b9b248b0a65420a69baf5b92dfe3f011a0b32ff9cae799d4cb41cc974f5241cf005af5f78
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-