General
-
Target
aec4e3f0144d8192b6fc9259b3d16adca42fee27510bf9db5c318861e54af551
-
Size
1.3MB
-
Sample
221102-n39gqsbfc8
-
MD5
1e826c369faeb85df03d0c8926b294b5
-
SHA1
18229c5857b8de750af00cd45a826f17ea5d894a
-
SHA256
aec4e3f0144d8192b6fc9259b3d16adca42fee27510bf9db5c318861e54af551
-
SHA512
4f03649a6c0e7abe542457205ebccd9dcd332285656ee970a0bfc9db17fe0e3dbab42f1408868041b61a7f468ca6c4d9777698992885373c24abe154ce3e06e1
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
aec4e3f0144d8192b6fc9259b3d16adca42fee27510bf9db5c318861e54af551.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
aec4e3f0144d8192b6fc9259b3d16adca42fee27510bf9db5c318861e54af551
-
Size
1.3MB
-
MD5
1e826c369faeb85df03d0c8926b294b5
-
SHA1
18229c5857b8de750af00cd45a826f17ea5d894a
-
SHA256
aec4e3f0144d8192b6fc9259b3d16adca42fee27510bf9db5c318861e54af551
-
SHA512
4f03649a6c0e7abe542457205ebccd9dcd332285656ee970a0bfc9db17fe0e3dbab42f1408868041b61a7f468ca6c4d9777698992885373c24abe154ce3e06e1
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-