General
-
Target
c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800
-
Size
1.3MB
-
Sample
221102-kwvs8aaeh3
-
MD5
cd4c52e74126519b1000925da79b33ea
-
SHA1
33bdda2679ef83acb055a2bafb57100c98b89ef4
-
SHA256
c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800
-
SHA512
9d1e2e4b68db3fac2f8a2ef33be293304c2f660ca9478fcf71f9d66aa561036c9fe09b1226570066444e9e1c4c62c60396325b38ae849dcba19b2e08ae3008d4
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800
-
Size
1.3MB
-
MD5
cd4c52e74126519b1000925da79b33ea
-
SHA1
33bdda2679ef83acb055a2bafb57100c98b89ef4
-
SHA256
c11a27a9612ed303b40e92c78dd4f6de59144484dc50a4646df2f8a1b2d0e800
-
SHA512
9d1e2e4b68db3fac2f8a2ef33be293304c2f660ca9478fcf71f9d66aa561036c9fe09b1226570066444e9e1c4c62c60396325b38ae849dcba19b2e08ae3008d4
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-