General
-
Target
d148fc48cce34f52e1d33cb4d1d5e66650fe856b8efa862cb05346a79a82646b
-
Size
1.3MB
-
Sample
221102-xkrzeabac9
-
MD5
3a1c759ad579d22c9d933ba9edb6092e
-
SHA1
5bf8c4e653692aa96f334c753ed9c4a97a1b1b4d
-
SHA256
d148fc48cce34f52e1d33cb4d1d5e66650fe856b8efa862cb05346a79a82646b
-
SHA512
2c457cd1a3368084ef5e3fc393eb8f3cbe0de0e95f809e05c1411221db79bb00bfd2a323624885d82c4d6f8ddf0e4b281e2887b6cb7fc5c0b74f26b3cd726f7a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
d148fc48cce34f52e1d33cb4d1d5e66650fe856b8efa862cb05346a79a82646b.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
d148fc48cce34f52e1d33cb4d1d5e66650fe856b8efa862cb05346a79a82646b
-
Size
1.3MB
-
MD5
3a1c759ad579d22c9d933ba9edb6092e
-
SHA1
5bf8c4e653692aa96f334c753ed9c4a97a1b1b4d
-
SHA256
d148fc48cce34f52e1d33cb4d1d5e66650fe856b8efa862cb05346a79a82646b
-
SHA512
2c457cd1a3368084ef5e3fc393eb8f3cbe0de0e95f809e05c1411221db79bb00bfd2a323624885d82c4d6f8ddf0e4b281e2887b6cb7fc5c0b74f26b3cd726f7a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-