General
-
Target
5c9ffd0729ab591fcdb1d14462c4ae42f3740e5a432fa0e7d8fd71055bdfc459
-
Size
1.5MB
-
Sample
230122-sy6x9sgd73
-
MD5
2c289507bcd526b692b833e345b0a3b9
-
SHA1
648c51af0d0e85f9fd4fa30f2266c2b1dedf37b2
-
SHA256
5c9ffd0729ab591fcdb1d14462c4ae42f3740e5a432fa0e7d8fd71055bdfc459
-
SHA512
46433a563526e7213b6d1cb0d8c8e441bc762c3acaff22a976a8c9463ee3f2ffa5a387b200fa9cfc2fbab234cc6f934508754e5f4cc5ba3a0c3dee2ab1d925ad
-
SSDEEP
24576:U2G/nvxW3Ww0tHUq2m+Uko0DQXHxbZfGYiUMfwtApTjN:UbA300qpt1xiFKqB
Behavioral task
behavioral1
Sample
5c9ffd0729ab591fcdb1d14462c4ae42f3740e5a432fa0e7d8fd71055bdfc459.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
5c9ffd0729ab591fcdb1d14462c4ae42f3740e5a432fa0e7d8fd71055bdfc459
-
Size
1.5MB
-
MD5
2c289507bcd526b692b833e345b0a3b9
-
SHA1
648c51af0d0e85f9fd4fa30f2266c2b1dedf37b2
-
SHA256
5c9ffd0729ab591fcdb1d14462c4ae42f3740e5a432fa0e7d8fd71055bdfc459
-
SHA512
46433a563526e7213b6d1cb0d8c8e441bc762c3acaff22a976a8c9463ee3f2ffa5a387b200fa9cfc2fbab234cc6f934508754e5f4cc5ba3a0c3dee2ab1d925ad
-
SSDEEP
24576:U2G/nvxW3Ww0tHUq2m+Uko0DQXHxbZfGYiUMfwtApTjN:UbA300qpt1xiFKqB
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-