General
-
Target
76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64
-
Size
1.3MB
-
Sample
221102-f2ft2aacer
-
MD5
9e8106f7ae8e8f19426c3b7b7481428a
-
SHA1
c7b3dd896230a96aba93e3b3fb58f831033cccb7
-
SHA256
76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64
-
SHA512
2fdd60ca2b345eb2ab5729d27cd6c859345a5090d7cc7b74be43cf1fb8748f3fae22795fda33155b8e036a03eb956dc3033d5153bfb3bdcb85d140d25004180d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64
-
Size
1.3MB
-
MD5
9e8106f7ae8e8f19426c3b7b7481428a
-
SHA1
c7b3dd896230a96aba93e3b3fb58f831033cccb7
-
SHA256
76b6ad8d398bed7d393080c714a5e8c2657b7aea7b299215239c12d96ea9cb64
-
SHA512
2fdd60ca2b345eb2ab5729d27cd6c859345a5090d7cc7b74be43cf1fb8748f3fae22795fda33155b8e036a03eb956dc3033d5153bfb3bdcb85d140d25004180d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-