General
-
Target
4b4fc3c5cb1ffc147d678a229e5e992fe9061e525336441d8cf262955c972519
-
Size
1.3MB
-
Sample
221102-qp3hdahah5
-
MD5
cf2e5b021750cb0975bf2a0bb4e02359
-
SHA1
2450845e518e803375662b460576c8216305519a
-
SHA256
4b4fc3c5cb1ffc147d678a229e5e992fe9061e525336441d8cf262955c972519
-
SHA512
9354fc321fc241a67fa5b44dee04148cc2bef7e4ec5a4d04d24cbcc4be3335bdaa06852ac168e1a71ab0e2e56853c8b923dee885318b68e2c6ee66f16f8a3a84
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
4b4fc3c5cb1ffc147d678a229e5e992fe9061e525336441d8cf262955c972519.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
4b4fc3c5cb1ffc147d678a229e5e992fe9061e525336441d8cf262955c972519
-
Size
1.3MB
-
MD5
cf2e5b021750cb0975bf2a0bb4e02359
-
SHA1
2450845e518e803375662b460576c8216305519a
-
SHA256
4b4fc3c5cb1ffc147d678a229e5e992fe9061e525336441d8cf262955c972519
-
SHA512
9354fc321fc241a67fa5b44dee04148cc2bef7e4ec5a4d04d24cbcc4be3335bdaa06852ac168e1a71ab0e2e56853c8b923dee885318b68e2c6ee66f16f8a3a84
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-