General
-
Target
c23b622c04d1fd7fec8e2c2bc5fea4d3d3e976d75cefad18d4c75f3b2b9a4b0e
-
Size
1.3MB
-
Sample
221102-qf4dbabfej
-
MD5
b6aad4cd3aab1623d0f884c7868e5734
-
SHA1
fe7f05d9738bd8dc7302a5069a1c44e370cba1eb
-
SHA256
c23b622c04d1fd7fec8e2c2bc5fea4d3d3e976d75cefad18d4c75f3b2b9a4b0e
-
SHA512
52170b318372125864cd225ed8cdbe8e736e2eed5d2250d4a494b2d04165c294710126a6e867ef457a1092877af87bdf56fbef1305842a38dd0ff4d4d60b708f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
c23b622c04d1fd7fec8e2c2bc5fea4d3d3e976d75cefad18d4c75f3b2b9a4b0e.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
c23b622c04d1fd7fec8e2c2bc5fea4d3d3e976d75cefad18d4c75f3b2b9a4b0e
-
Size
1.3MB
-
MD5
b6aad4cd3aab1623d0f884c7868e5734
-
SHA1
fe7f05d9738bd8dc7302a5069a1c44e370cba1eb
-
SHA256
c23b622c04d1fd7fec8e2c2bc5fea4d3d3e976d75cefad18d4c75f3b2b9a4b0e
-
SHA512
52170b318372125864cd225ed8cdbe8e736e2eed5d2250d4a494b2d04165c294710126a6e867ef457a1092877af87bdf56fbef1305842a38dd0ff4d4d60b708f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-