General
-
Target
00dc8170f25cec60ba3879cf8570fc25d83a571fe995f845149e02a076e8b07c
-
Size
1.3MB
-
Sample
221102-c6matsggb7
-
MD5
9d8aae57dccf9a1b89b2ad6814b6104e
-
SHA1
48df9dcefbf7b878b4e3e1ddc83782f1cd831c5b
-
SHA256
00dc8170f25cec60ba3879cf8570fc25d83a571fe995f845149e02a076e8b07c
-
SHA512
af6884bb0a42fa5cd0adf10bf2cd6242ade29068c44fedafdf78eb384752bd766405cc5cc47ccbee5ac9480bdf6174974b3a8f80d88c16f6942c5481a4cffe47
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
00dc8170f25cec60ba3879cf8570fc25d83a571fe995f845149e02a076e8b07c.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
00dc8170f25cec60ba3879cf8570fc25d83a571fe995f845149e02a076e8b07c
-
Size
1.3MB
-
MD5
9d8aae57dccf9a1b89b2ad6814b6104e
-
SHA1
48df9dcefbf7b878b4e3e1ddc83782f1cd831c5b
-
SHA256
00dc8170f25cec60ba3879cf8570fc25d83a571fe995f845149e02a076e8b07c
-
SHA512
af6884bb0a42fa5cd0adf10bf2cd6242ade29068c44fedafdf78eb384752bd766405cc5cc47ccbee5ac9480bdf6174974b3a8f80d88c16f6942c5481a4cffe47
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-