General
-
Target
93a60ce0831fc48f44709f66b3d7489c6305b56588ef03ac329eef380b843204
-
Size
1.3MB
-
Sample
221102-fdhnqahdc4
-
MD5
9b90f5f2c59d8b777f0426cb7ee5237a
-
SHA1
6c118a231abcc754f23b6ea95e9e3f97d080d745
-
SHA256
93a60ce0831fc48f44709f66b3d7489c6305b56588ef03ac329eef380b843204
-
SHA512
e7ee0ed90f7d72e2740a457dfc8de4c8338d3bdd27df247620169b92780d1ded2d1e03eca0009fa1da4fd191dae3d4e986aa980461d9b65634d6306124e9762c
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
93a60ce0831fc48f44709f66b3d7489c6305b56588ef03ac329eef380b843204.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
93a60ce0831fc48f44709f66b3d7489c6305b56588ef03ac329eef380b843204
-
Size
1.3MB
-
MD5
9b90f5f2c59d8b777f0426cb7ee5237a
-
SHA1
6c118a231abcc754f23b6ea95e9e3f97d080d745
-
SHA256
93a60ce0831fc48f44709f66b3d7489c6305b56588ef03ac329eef380b843204
-
SHA512
e7ee0ed90f7d72e2740a457dfc8de4c8338d3bdd27df247620169b92780d1ded2d1e03eca0009fa1da4fd191dae3d4e986aa980461d9b65634d6306124e9762c
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-