General
-
Target
319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6
-
Size
1.3MB
-
Sample
221102-mmqh9abbe9
-
MD5
070801084b08d2473c0c98c020632130
-
SHA1
26bbc11d9a8b57182f91ff1013a0714655eb35d6
-
SHA256
319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6
-
SHA512
1d2386b4db2e3cba5e020d50cfd1f816e7f749daf0b57d3eb82147ec317fc3101f8594247fa61e8d21af383df20ebb47f30340a831c6207a4329ce792ee9c3be
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6
-
Size
1.3MB
-
MD5
070801084b08d2473c0c98c020632130
-
SHA1
26bbc11d9a8b57182f91ff1013a0714655eb35d6
-
SHA256
319a6b5972934aef9f7596b13e4ae84e03d77c42aa11fdfbc9e96a750e2497a6
-
SHA512
1d2386b4db2e3cba5e020d50cfd1f816e7f749daf0b57d3eb82147ec317fc3101f8594247fa61e8d21af383df20ebb47f30340a831c6207a4329ce792ee9c3be
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-