General
-
Target
58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176
-
Size
1.3MB
-
Sample
221102-jqpvcabaek
-
MD5
8fe5984fbeaaa6e5b0f7b6b62f75f201
-
SHA1
45ae293f85b063724540cb24bc6f954e8ea13b91
-
SHA256
58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176
-
SHA512
d7089a7973c9c8578cbc9d85214bf05084d52f0d09c8b28ded755ba37f3d0e3241c431c3fe356ca01a82c32bbe3a99aa348cd4015f132360f2067872f048c8ff
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176
-
Size
1.3MB
-
MD5
8fe5984fbeaaa6e5b0f7b6b62f75f201
-
SHA1
45ae293f85b063724540cb24bc6f954e8ea13b91
-
SHA256
58566925d97e2ab4173afb444a2440de84007947d468b9c8238d5b70ff941176
-
SHA512
d7089a7973c9c8578cbc9d85214bf05084d52f0d09c8b28ded755ba37f3d0e3241c431c3fe356ca01a82c32bbe3a99aa348cd4015f132360f2067872f048c8ff
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-