General
-
Target
c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf
-
Size
1.3MB
-
Sample
221103-majj6shbd2
-
MD5
9b8446aad6b02a8c58a9ee3728e38b98
-
SHA1
57a31a7fa23b11890468542b5b295f55eaeb29d1
-
SHA256
c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf
-
SHA512
c9134f2af6ea50c30a8218e50c5691c5089a8a5d27c8a997059cbc3ff8e7dee82e0ec03008e0cf6a993c5fa23a9be86830c8c9261e5c2ddc171937b8ba06079a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf
-
Size
1.3MB
-
MD5
9b8446aad6b02a8c58a9ee3728e38b98
-
SHA1
57a31a7fa23b11890468542b5b295f55eaeb29d1
-
SHA256
c5efd8bd84f96df844fa21d6f7d0aae8acf72738d715430d059e30507640dbcf
-
SHA512
c9134f2af6ea50c30a8218e50c5691c5089a8a5d27c8a997059cbc3ff8e7dee82e0ec03008e0cf6a993c5fa23a9be86830c8c9261e5c2ddc171937b8ba06079a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-