General
-
Target
e6d2dd48bea3f1f1d1ea64d549c93ce64015f37c5ae77757061e55e5f6aacc2d
-
Size
1.3MB
-
Sample
221102-cn8q4sgfb8
-
MD5
f48121a9e0c02087b3893cad03e9e3f9
-
SHA1
e4c831ba83606b17093233bb5642cea66dc073b5
-
SHA256
e6d2dd48bea3f1f1d1ea64d549c93ce64015f37c5ae77757061e55e5f6aacc2d
-
SHA512
71f956ac51e44049286825b826e36ac1996536e221c93fc7fa705a34aa72797934c3d4e97732f027b17f5863323fbba24c8af427900377e4a56fc40840b09254
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
e6d2dd48bea3f1f1d1ea64d549c93ce64015f37c5ae77757061e55e5f6aacc2d.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
e6d2dd48bea3f1f1d1ea64d549c93ce64015f37c5ae77757061e55e5f6aacc2d
-
Size
1.3MB
-
MD5
f48121a9e0c02087b3893cad03e9e3f9
-
SHA1
e4c831ba83606b17093233bb5642cea66dc073b5
-
SHA256
e6d2dd48bea3f1f1d1ea64d549c93ce64015f37c5ae77757061e55e5f6aacc2d
-
SHA512
71f956ac51e44049286825b826e36ac1996536e221c93fc7fa705a34aa72797934c3d4e97732f027b17f5863323fbba24c8af427900377e4a56fc40840b09254
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-