General
-
Target
7406eb9f19e084d5c50a1c400c161ce46c0f26233af4230a684adc3ba83a402f
-
Size
1.3MB
-
Sample
221103-vvnzdscha6
-
MD5
684989b61f8f2c12a8a3a7168a1efd56
-
SHA1
5b7886d4ed62fba33a24fa5d2b31c3a485cd61ea
-
SHA256
7406eb9f19e084d5c50a1c400c161ce46c0f26233af4230a684adc3ba83a402f
-
SHA512
947d26a2705dbb44d7f924924cc400e609d4f669f525c2dc18007e4bca86d7dd029ce0907e9e694de31dcd7dd1574981ea1e72593d1b552e21853f1e4538f987
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
7406eb9f19e084d5c50a1c400c161ce46c0f26233af4230a684adc3ba83a402f.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
7406eb9f19e084d5c50a1c400c161ce46c0f26233af4230a684adc3ba83a402f
-
Size
1.3MB
-
MD5
684989b61f8f2c12a8a3a7168a1efd56
-
SHA1
5b7886d4ed62fba33a24fa5d2b31c3a485cd61ea
-
SHA256
7406eb9f19e084d5c50a1c400c161ce46c0f26233af4230a684adc3ba83a402f
-
SHA512
947d26a2705dbb44d7f924924cc400e609d4f669f525c2dc18007e4bca86d7dd029ce0907e9e694de31dcd7dd1574981ea1e72593d1b552e21853f1e4538f987
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-