General
-
Target
5c9b5107620451274bb07fbe4536032a0d708e84108c29134577330400fe19a3
-
Size
321KB
-
Sample
221102-vcxtkschbr
-
MD5
c211703567f324a3307f54e0e0d6e16e
-
SHA1
48192cb9c60c3e1a5c76a233efff568b2b00928c
-
SHA256
5c9b5107620451274bb07fbe4536032a0d708e84108c29134577330400fe19a3
-
SHA512
724e01eed0edc233108dbad96537db05fd711aa833684aae22e4cf24a091aa6eeb8b2e139bfc7da59c76020e703bf8371630b6895f219bc4587996c0559d57e2
-
SSDEEP
3072:BUj8KA7oSofER45xlIqa09lnFNQbyoNLJlbxPPfNyDxIX34VggjcGkNIVqI/F:Kj8KUgqWWqa09lobyoDflX3U7ITsq
Static task
static1
Behavioral task
behavioral1
Sample
5c9b5107620451274bb07fbe4536032a0d708e84108c29134577330400fe19a3.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
5c9b5107620451274bb07fbe4536032a0d708e84108c29134577330400fe19a3
-
Size
321KB
-
MD5
c211703567f324a3307f54e0e0d6e16e
-
SHA1
48192cb9c60c3e1a5c76a233efff568b2b00928c
-
SHA256
5c9b5107620451274bb07fbe4536032a0d708e84108c29134577330400fe19a3
-
SHA512
724e01eed0edc233108dbad96537db05fd711aa833684aae22e4cf24a091aa6eeb8b2e139bfc7da59c76020e703bf8371630b6895f219bc4587996c0559d57e2
-
SSDEEP
3072:BUj8KA7oSofER45xlIqa09lnFNQbyoNLJlbxPPfNyDxIX34VggjcGkNIVqI/F:Kj8KUgqWWqa09lobyoDflX3U7ITsq
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-