General
-
Target
a0bdba0040842250abf6ccbfc8ec9ddce42739e522f3ac6d0637b151572a74cc
-
Size
1.3MB
-
Sample
221104-wl6craheb2
-
MD5
5d3740b77aa1847026e1254935aaafce
-
SHA1
784b94baa4ee719f91fe2cbb0d19ae776bcb3cba
-
SHA256
a0bdba0040842250abf6ccbfc8ec9ddce42739e522f3ac6d0637b151572a74cc
-
SHA512
b6da4d44b11c4810eb98cbdca9d08d247ac90a546d8cb1dd172b010e7764f2a7efbc99f062ac7220c59893f9e05d60fb9fda7b33ec60c3915255224a7a6b012f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
a0bdba0040842250abf6ccbfc8ec9ddce42739e522f3ac6d0637b151572a74cc.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
a0bdba0040842250abf6ccbfc8ec9ddce42739e522f3ac6d0637b151572a74cc
-
Size
1.3MB
-
MD5
5d3740b77aa1847026e1254935aaafce
-
SHA1
784b94baa4ee719f91fe2cbb0d19ae776bcb3cba
-
SHA256
a0bdba0040842250abf6ccbfc8ec9ddce42739e522f3ac6d0637b151572a74cc
-
SHA512
b6da4d44b11c4810eb98cbdca9d08d247ac90a546d8cb1dd172b010e7764f2a7efbc99f062ac7220c59893f9e05d60fb9fda7b33ec60c3915255224a7a6b012f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-