General
-
Target
55d40cd8c837c10a74fb135e0973db85a553209117a67008f68582b5bbbcf02b
-
Size
1.1MB
-
Sample
230122-sf5bqaab6s
-
MD5
f10fe10a538f342b001eb1c9ee3855f1
-
SHA1
b52c40944c9a593ab5fb2bdb878c43f7f0f63361
-
SHA256
55d40cd8c837c10a74fb135e0973db85a553209117a67008f68582b5bbbcf02b
-
SHA512
c09ee1ff09a34ce6443e8b1505b52b334db742fad8545d8354b2ada8361fe07d00c7e9350160cb0cddb1a122d2c3c2355ecbe5058cb0939e2ebfda8a2b6612db
-
SSDEEP
24576:U2G/nvxW3Ww0tWamzgLwLwTi7Pvezfsj088gN/aqEUIr2:UbA30WBujO+fsj0DIcUl
Behavioral task
behavioral1
Sample
55d40cd8c837c10a74fb135e0973db85a553209117a67008f68582b5bbbcf02b.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
55d40cd8c837c10a74fb135e0973db85a553209117a67008f68582b5bbbcf02b
-
Size
1.1MB
-
MD5
f10fe10a538f342b001eb1c9ee3855f1
-
SHA1
b52c40944c9a593ab5fb2bdb878c43f7f0f63361
-
SHA256
55d40cd8c837c10a74fb135e0973db85a553209117a67008f68582b5bbbcf02b
-
SHA512
c09ee1ff09a34ce6443e8b1505b52b334db742fad8545d8354b2ada8361fe07d00c7e9350160cb0cddb1a122d2c3c2355ecbe5058cb0939e2ebfda8a2b6612db
-
SSDEEP
24576:U2G/nvxW3Ww0tWamzgLwLwTi7Pvezfsj088gN/aqEUIr2:UbA30WBujO+fsj0DIcUl
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-