General
-
Target
3be32a91923abbf684d585e3851ae23b0263e3c4e712396021dc967fa7cda02d
-
Size
1.3MB
-
Sample
221103-qtcgrachhp
-
MD5
eea50aa068d35179edd601611b9f3739
-
SHA1
5dacbbf076ec1848f280127a0c94f139e568cdf3
-
SHA256
3be32a91923abbf684d585e3851ae23b0263e3c4e712396021dc967fa7cda02d
-
SHA512
5dd182e45708057b4fde973021b799845eaf7ea5f2a96f0ffa168b96081ef8a270a5ac5d89f08c3fbb096e16fcffa6cee9011f850c2c1a24831d9d0fa1ef3b73
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
3be32a91923abbf684d585e3851ae23b0263e3c4e712396021dc967fa7cda02d.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
3be32a91923abbf684d585e3851ae23b0263e3c4e712396021dc967fa7cda02d
-
Size
1.3MB
-
MD5
eea50aa068d35179edd601611b9f3739
-
SHA1
5dacbbf076ec1848f280127a0c94f139e568cdf3
-
SHA256
3be32a91923abbf684d585e3851ae23b0263e3c4e712396021dc967fa7cda02d
-
SHA512
5dd182e45708057b4fde973021b799845eaf7ea5f2a96f0ffa168b96081ef8a270a5ac5d89f08c3fbb096e16fcffa6cee9011f850c2c1a24831d9d0fa1ef3b73
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-