General
-
Target
5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2
-
Size
1.3MB
-
Sample
221102-k4pbeaafc8
-
MD5
735f87c106f06f50b7af10f78d7c53ed
-
SHA1
363d0466e31781ba0ff60eb1d5e946a870d31deb
-
SHA256
5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2
-
SHA512
b513292891e73c2d21414ec6b5c58ac543f40e428d0d48cbaa9cec7465d407c18eb51ce3059cd3247152a743f83888a3aff18f815a4cc6c8c29d13e6755bcbe5
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2
-
Size
1.3MB
-
MD5
735f87c106f06f50b7af10f78d7c53ed
-
SHA1
363d0466e31781ba0ff60eb1d5e946a870d31deb
-
SHA256
5ed2eebca8a94997e55debb30c9f7ced4b93cc561deb10960b2bb0dcb73801f2
-
SHA512
b513292891e73c2d21414ec6b5c58ac543f40e428d0d48cbaa9cec7465d407c18eb51ce3059cd3247152a743f83888a3aff18f815a4cc6c8c29d13e6755bcbe5
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-