General
-
Target
468543b81b1e9c318055aff3efc687714f274106bdfa15fb14f16fe6b1ccaeb1
-
Size
1.3MB
-
Sample
221102-k9pjcsaff6
-
MD5
c9cd0c33d8a9a13c649bbbbe04b5c473
-
SHA1
e9fec2e0c7020374b61e5da590e65456fa343291
-
SHA256
468543b81b1e9c318055aff3efc687714f274106bdfa15fb14f16fe6b1ccaeb1
-
SHA512
a02225e1aa32ac7f3b75b5debee63f78c15f2dfeae6836734426006dd691828d140060f557c63932653b4d1d54ceb016759c2efb25610319f3aba10100f83b24
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
468543b81b1e9c318055aff3efc687714f274106bdfa15fb14f16fe6b1ccaeb1.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
468543b81b1e9c318055aff3efc687714f274106bdfa15fb14f16fe6b1ccaeb1
-
Size
1.3MB
-
MD5
c9cd0c33d8a9a13c649bbbbe04b5c473
-
SHA1
e9fec2e0c7020374b61e5da590e65456fa343291
-
SHA256
468543b81b1e9c318055aff3efc687714f274106bdfa15fb14f16fe6b1ccaeb1
-
SHA512
a02225e1aa32ac7f3b75b5debee63f78c15f2dfeae6836734426006dd691828d140060f557c63932653b4d1d54ceb016759c2efb25610319f3aba10100f83b24
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-