General
-
Target
022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073
-
Size
1.3MB
-
Sample
221102-fpd5nsheb2
-
MD5
94c4e0ec280884ed00549730d5c5d536
-
SHA1
96634b960d00f36edeb80e10fbdd99ca65820218
-
SHA256
022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073
-
SHA512
54885cf0d27635c6b33246489ed1c731a0a8f8ed006aab725fd3f2d3f0146903c09acf4bb2f3afe885f6e9a3e672662fb44dfed9be257cf403b07a1159c6a31c
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073
-
Size
1.3MB
-
MD5
94c4e0ec280884ed00549730d5c5d536
-
SHA1
96634b960d00f36edeb80e10fbdd99ca65820218
-
SHA256
022d9ee28cf0460f321f70a9c86cc7906958f73182dc5170299250268ce65073
-
SHA512
54885cf0d27635c6b33246489ed1c731a0a8f8ed006aab725fd3f2d3f0146903c09acf4bb2f3afe885f6e9a3e672662fb44dfed9be257cf403b07a1159c6a31c
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-