General
-
Target
2e56827c42f7059447828a6965f6d4bc972c78d3c4d48ee1ca79c416ab1ecd7b
-
Size
1.3MB
-
Sample
230202-13fkwagd33
-
MD5
337782996b20bbe733a66d58f211ebc6
-
SHA1
3203e69975cffd6e7665d7716927e881bab33c3d
-
SHA256
2e56827c42f7059447828a6965f6d4bc972c78d3c4d48ee1ca79c416ab1ecd7b
-
SHA512
806ad988ea69f6d341cd2dddb2188ac2d45289de50631178f0238c174df87f6e815c215f38fcb204f6c2cdcd5015a3919b99f250b953d19d37aee8cb4164809a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
2e56827c42f7059447828a6965f6d4bc972c78d3c4d48ee1ca79c416ab1ecd7b.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
2e56827c42f7059447828a6965f6d4bc972c78d3c4d48ee1ca79c416ab1ecd7b
-
Size
1.3MB
-
MD5
337782996b20bbe733a66d58f211ebc6
-
SHA1
3203e69975cffd6e7665d7716927e881bab33c3d
-
SHA256
2e56827c42f7059447828a6965f6d4bc972c78d3c4d48ee1ca79c416ab1ecd7b
-
SHA512
806ad988ea69f6d341cd2dddb2188ac2d45289de50631178f0238c174df87f6e815c215f38fcb204f6c2cdcd5015a3919b99f250b953d19d37aee8cb4164809a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-