General
-
Target
4293bf0de92d6055a324c32b6f3db4a8f525a0210fcccd0ccecfea2f2ac22c88
-
Size
1.3MB
-
Sample
221102-c3ndqagfh9
-
MD5
2aad25a8cfc190d6e743c392c9f82562
-
SHA1
962f1e3cb89659878718d3df12396746c8b5528a
-
SHA256
4293bf0de92d6055a324c32b6f3db4a8f525a0210fcccd0ccecfea2f2ac22c88
-
SHA512
57c61a96cf690d7fb177991cc55d7aacdac7631f467e7689f258f2fbcebf3461e13413df282279707eb48ba5963419b717d0e7d6d0726975e589f92d952bfb10
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
4293bf0de92d6055a324c32b6f3db4a8f525a0210fcccd0ccecfea2f2ac22c88.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
4293bf0de92d6055a324c32b6f3db4a8f525a0210fcccd0ccecfea2f2ac22c88
-
Size
1.3MB
-
MD5
2aad25a8cfc190d6e743c392c9f82562
-
SHA1
962f1e3cb89659878718d3df12396746c8b5528a
-
SHA256
4293bf0de92d6055a324c32b6f3db4a8f525a0210fcccd0ccecfea2f2ac22c88
-
SHA512
57c61a96cf690d7fb177991cc55d7aacdac7631f467e7689f258f2fbcebf3461e13413df282279707eb48ba5963419b717d0e7d6d0726975e589f92d952bfb10
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-