General
-
Target
e7590ee029d53ad7ff485d22f022d0f4fe23c9697aef292acb9c06cf506efc0d
-
Size
1.3MB
-
Sample
221102-lxdf1aahb4
-
MD5
b3630e0e55f63c5a7ffac82489e8882b
-
SHA1
da15ae779b9337733ca3c14fe68bfaaf5ce14e79
-
SHA256
e7590ee029d53ad7ff485d22f022d0f4fe23c9697aef292acb9c06cf506efc0d
-
SHA512
d7b9fbac5c48d84d30580cc44fab70be7204fdc49524ab51112c68a38182882bdc3f378162e72eb5fed1bcb4fd395944cf2bcd4ac99ad7b417e950d717f69686
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
e7590ee029d53ad7ff485d22f022d0f4fe23c9697aef292acb9c06cf506efc0d.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
e7590ee029d53ad7ff485d22f022d0f4fe23c9697aef292acb9c06cf506efc0d
-
Size
1.3MB
-
MD5
b3630e0e55f63c5a7ffac82489e8882b
-
SHA1
da15ae779b9337733ca3c14fe68bfaaf5ce14e79
-
SHA256
e7590ee029d53ad7ff485d22f022d0f4fe23c9697aef292acb9c06cf506efc0d
-
SHA512
d7b9fbac5c48d84d30580cc44fab70be7204fdc49524ab51112c68a38182882bdc3f378162e72eb5fed1bcb4fd395944cf2bcd4ac99ad7b417e950d717f69686
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-