General
-
Target
0909d9161329bd656aa80c3bde317c4fc6136496c46c9ce44edd78e788ba6871
-
Size
1.3MB
-
Sample
221103-2xw64sgdg2
-
MD5
46194e4fb2fe418ed9a6e3681de2bc42
-
SHA1
cd0114660c01274c857627be9b87feb685cc27eb
-
SHA256
0909d9161329bd656aa80c3bde317c4fc6136496c46c9ce44edd78e788ba6871
-
SHA512
a71bc04f5d33ad71abf7534842fb409ef4188e1c1110d5cdcd5e6ae50648322b21f5b92eabaa3d76b63123623352255cd98d913c3c85b968be9295cf98d8fe63
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
0909d9161329bd656aa80c3bde317c4fc6136496c46c9ce44edd78e788ba6871.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
0909d9161329bd656aa80c3bde317c4fc6136496c46c9ce44edd78e788ba6871
-
Size
1.3MB
-
MD5
46194e4fb2fe418ed9a6e3681de2bc42
-
SHA1
cd0114660c01274c857627be9b87feb685cc27eb
-
SHA256
0909d9161329bd656aa80c3bde317c4fc6136496c46c9ce44edd78e788ba6871
-
SHA512
a71bc04f5d33ad71abf7534842fb409ef4188e1c1110d5cdcd5e6ae50648322b21f5b92eabaa3d76b63123623352255cd98d913c3c85b968be9295cf98d8fe63
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-