General
-
Target
e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa
-
Size
1.3MB
-
Sample
221102-m6bjfabcf3
-
MD5
0a5cc64f2f77f6bc3271fe5feae3d707
-
SHA1
a0e400ce0a4914790da7af3634f559ed95bb26df
-
SHA256
e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa
-
SHA512
8e873477bd5975e160c534ba1ebd6ca6714b63f07dac32314118afe8bbf47fd8100c2dab79f14e3d69351321945867848183e4b7ca0536a36c38f09ec0ace1cf
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa
-
Size
1.3MB
-
MD5
0a5cc64f2f77f6bc3271fe5feae3d707
-
SHA1
a0e400ce0a4914790da7af3634f559ed95bb26df
-
SHA256
e488ef073c850d3de5b5dd7e087696a5b17d2a08d2edf8b9bf44070a482a02aa
-
SHA512
8e873477bd5975e160c534ba1ebd6ca6714b63f07dac32314118afe8bbf47fd8100c2dab79f14e3d69351321945867848183e4b7ca0536a36c38f09ec0ace1cf
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-