General
-
Target
66142817d8430bba7b84d447660de7a9beb5c269da0f46280fc104bc9455e7eb
-
Size
1.3MB
-
Sample
221103-m5j47abgdk
-
MD5
3eaf58f7ba55e166d85302f2937ee4d6
-
SHA1
27c7618b15cb27cf2f1f1bd4d85cd92593b628db
-
SHA256
66142817d8430bba7b84d447660de7a9beb5c269da0f46280fc104bc9455e7eb
-
SHA512
34c0c58b2d2d9443def4d22a7b98350d21a6b15b996a659aa86c87d39611bb9bc33a34ab0751785210dc848f0989f04d253f4cb157dbb9ca5cac5c6d28c6e7a6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
66142817d8430bba7b84d447660de7a9beb5c269da0f46280fc104bc9455e7eb.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
66142817d8430bba7b84d447660de7a9beb5c269da0f46280fc104bc9455e7eb
-
Size
1.3MB
-
MD5
3eaf58f7ba55e166d85302f2937ee4d6
-
SHA1
27c7618b15cb27cf2f1f1bd4d85cd92593b628db
-
SHA256
66142817d8430bba7b84d447660de7a9beb5c269da0f46280fc104bc9455e7eb
-
SHA512
34c0c58b2d2d9443def4d22a7b98350d21a6b15b996a659aa86c87d39611bb9bc33a34ab0751785210dc848f0989f04d253f4cb157dbb9ca5cac5c6d28c6e7a6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-