General
-
Target
cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759
-
Size
1.3MB
-
Sample
221105-vj7x5ababj
-
MD5
9e81f67213f89b7c4dba4c20dd06eff0
-
SHA1
7c3a15b441f52785d5f8199a5a22501b6b37be5c
-
SHA256
cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759
-
SHA512
1287d6f7521a888cb83289097e0ee29520de8f9eac78d66ee35e5c515332441528066673cf4f2f2db54bf9b10b3bcce3c99fca13686feed02340bdcfe13acc59
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759
-
Size
1.3MB
-
MD5
9e81f67213f89b7c4dba4c20dd06eff0
-
SHA1
7c3a15b441f52785d5f8199a5a22501b6b37be5c
-
SHA256
cdc1755ad93976c5f02b97c3863b0951b88ff6afa967c192c5ada2adece06759
-
SHA512
1287d6f7521a888cb83289097e0ee29520de8f9eac78d66ee35e5c515332441528066673cf4f2f2db54bf9b10b3bcce3c99fca13686feed02340bdcfe13acc59
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-