General
-
Target
0c3d85f7e3b685722edc23bb619606866c7522640e0bba42012de6fe2e94d04d
-
Size
1.3MB
-
Sample
221102-f9ft1aadaq
-
MD5
95cfec48463b1171b3040dd5d2fb202a
-
SHA1
b340ceae18295ab4de80e23f3d0593e9026469d2
-
SHA256
0c3d85f7e3b685722edc23bb619606866c7522640e0bba42012de6fe2e94d04d
-
SHA512
741dfa0372fe2a19510daf18ce182f693393b2618f840742931876dbd0febce06153325cd7f2210aacf7aa5d517141084ad82a85ac96307409778c94d017d67f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
0c3d85f7e3b685722edc23bb619606866c7522640e0bba42012de6fe2e94d04d.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
0c3d85f7e3b685722edc23bb619606866c7522640e0bba42012de6fe2e94d04d
-
Size
1.3MB
-
MD5
95cfec48463b1171b3040dd5d2fb202a
-
SHA1
b340ceae18295ab4de80e23f3d0593e9026469d2
-
SHA256
0c3d85f7e3b685722edc23bb619606866c7522640e0bba42012de6fe2e94d04d
-
SHA512
741dfa0372fe2a19510daf18ce182f693393b2618f840742931876dbd0febce06153325cd7f2210aacf7aa5d517141084ad82a85ac96307409778c94d017d67f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-