General
-
Target
8b05fd53fe39df7f3443c7a7aa751408cf09628bdfea416bb3bb4a062d9a6949
-
Size
1.3MB
-
Sample
221217-fe4ycagb83
-
MD5
208f7d8b20f6546e5dbce1a6488f58ac
-
SHA1
261394e4148ae7fd616be8350464c4608cc7d1e7
-
SHA256
8b05fd53fe39df7f3443c7a7aa751408cf09628bdfea416bb3bb4a062d9a6949
-
SHA512
d2bb39c1647609b999d5124782e1e74e0b20aaf71f4e218f2984859cdb28383bf22e70616c1ec485b974f4d2ec9f76c0bfce7d0002fef77bd781d8b71e381fc2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
8b05fd53fe39df7f3443c7a7aa751408cf09628bdfea416bb3bb4a062d9a6949.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b05fd53fe39df7f3443c7a7aa751408cf09628bdfea416bb3bb4a062d9a6949.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
8b05fd53fe39df7f3443c7a7aa751408cf09628bdfea416bb3bb4a062d9a6949
-
Size
1.3MB
-
MD5
208f7d8b20f6546e5dbce1a6488f58ac
-
SHA1
261394e4148ae7fd616be8350464c4608cc7d1e7
-
SHA256
8b05fd53fe39df7f3443c7a7aa751408cf09628bdfea416bb3bb4a062d9a6949
-
SHA512
d2bb39c1647609b999d5124782e1e74e0b20aaf71f4e218f2984859cdb28383bf22e70616c1ec485b974f4d2ec9f76c0bfce7d0002fef77bd781d8b71e381fc2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-