General
-
Target
cf1fdb7082f6e272015c02c6ff363d3395f8a6b9efa6b2aa7a00f7959bdc7ef0
-
Size
1.3MB
-
Sample
221102-fjbglaabcj
-
MD5
f51f7048a62a1e69128706e84d4e2f29
-
SHA1
4540a65cb5fe89d44f55a70294fd7eb4936613b0
-
SHA256
cf1fdb7082f6e272015c02c6ff363d3395f8a6b9efa6b2aa7a00f7959bdc7ef0
-
SHA512
e7a5f20b32379cafc041ea142073b2e88bcf6af5c508a4139d2e118343d46899a1a657bf88b0938d3ed0578b95bbe5fadcd556a9ed0ddf84b324f9070ac9d0ef
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
cf1fdb7082f6e272015c02c6ff363d3395f8a6b9efa6b2aa7a00f7959bdc7ef0.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
cf1fdb7082f6e272015c02c6ff363d3395f8a6b9efa6b2aa7a00f7959bdc7ef0
-
Size
1.3MB
-
MD5
f51f7048a62a1e69128706e84d4e2f29
-
SHA1
4540a65cb5fe89d44f55a70294fd7eb4936613b0
-
SHA256
cf1fdb7082f6e272015c02c6ff363d3395f8a6b9efa6b2aa7a00f7959bdc7ef0
-
SHA512
e7a5f20b32379cafc041ea142073b2e88bcf6af5c508a4139d2e118343d46899a1a657bf88b0938d3ed0578b95bbe5fadcd556a9ed0ddf84b324f9070ac9d0ef
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-