General
-
Target
b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e
-
Size
1.3MB
-
Sample
221105-vxsqcsbagr
-
MD5
21cf8c9db48f0e9680204b3214c0ee7c
-
SHA1
47f18a61e60f493cc581a9e1456eea5b8260ab2c
-
SHA256
b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e
-
SHA512
57a17dcaca17ae88996c39796c94d2863433aaf19492575931cf4c5db976e7c6704644c1bd01547646f9fd6dfcd6c64d2a984e6f5a1c4f2ffed9944e4eb33758
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e
-
Size
1.3MB
-
MD5
21cf8c9db48f0e9680204b3214c0ee7c
-
SHA1
47f18a61e60f493cc581a9e1456eea5b8260ab2c
-
SHA256
b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e
-
SHA512
57a17dcaca17ae88996c39796c94d2863433aaf19492575931cf4c5db976e7c6704644c1bd01547646f9fd6dfcd6c64d2a984e6f5a1c4f2ffed9944e4eb33758
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-