General
-
Target
0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c
-
Size
1.3MB
-
Sample
221103-dmhnzaeaa6
-
MD5
743d406a4e451bdb763178e63d9b9d16
-
SHA1
3b751c502d635d4c4907cd5a9bd5e5abe565afd4
-
SHA256
0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c
-
SHA512
1ed77deb2a1844931a03dd8b064c982f0174a31cf424c78c49419ef870e8a027289ed37ed101aeb7279e59d3b59cc41f582368d60b86901ecf5d18c8e5483b09
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c
-
Size
1.3MB
-
MD5
743d406a4e451bdb763178e63d9b9d16
-
SHA1
3b751c502d635d4c4907cd5a9bd5e5abe565afd4
-
SHA256
0520017e6f0ffece9f124accb7714ed6892fb6f0d52cae54df1e797951444f7c
-
SHA512
1ed77deb2a1844931a03dd8b064c982f0174a31cf424c78c49419ef870e8a027289ed37ed101aeb7279e59d3b59cc41f582368d60b86901ecf5d18c8e5483b09
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-