General
-
Target
dddb0cc9323ab6c24b20b537d117996449c88b39f870f7c634a71f861669369d
-
Size
1.3MB
-
Sample
221103-nhdjkabhej
-
MD5
b7341d892665d8634d375bb47b76e0d4
-
SHA1
81217a4ffe87f710941c418b993cd749302a62a5
-
SHA256
dddb0cc9323ab6c24b20b537d117996449c88b39f870f7c634a71f861669369d
-
SHA512
ee0c1f90a1e52f00cf6e9861f5cdae71a4abe9422e9a43c166d73fd782140f1968cc534ee3e829441ccf36c18a2237384f9095baa5386e1fb725e6686a56474a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
dddb0cc9323ab6c24b20b537d117996449c88b39f870f7c634a71f861669369d.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
dddb0cc9323ab6c24b20b537d117996449c88b39f870f7c634a71f861669369d
-
Size
1.3MB
-
MD5
b7341d892665d8634d375bb47b76e0d4
-
SHA1
81217a4ffe87f710941c418b993cd749302a62a5
-
SHA256
dddb0cc9323ab6c24b20b537d117996449c88b39f870f7c634a71f861669369d
-
SHA512
ee0c1f90a1e52f00cf6e9861f5cdae71a4abe9422e9a43c166d73fd782140f1968cc534ee3e829441ccf36c18a2237384f9095baa5386e1fb725e6686a56474a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-