General
-
Target
239ac412c988bd7a5256588042ea1d94ad417558102a0e5fc14f81035bae591a
-
Size
1.3MB
-
Sample
230202-17c1jsgd67
-
MD5
74a3602fa37c13016a6e8ad9bb98903a
-
SHA1
766d97b0c9b24f227bb3038e6f1a1d3ef1d0459e
-
SHA256
239ac412c988bd7a5256588042ea1d94ad417558102a0e5fc14f81035bae591a
-
SHA512
18d1ed4d2349e65506ee0582a2e7ccbd1eb7e63ed1392141d0dc8ddbecb7c319b3f9cddb2268a606d9819f8aaa5b4a460a4aa36413f380f5ed417e8f91902ac1
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
239ac412c988bd7a5256588042ea1d94ad417558102a0e5fc14f81035bae591a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
239ac412c988bd7a5256588042ea1d94ad417558102a0e5fc14f81035bae591a.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
239ac412c988bd7a5256588042ea1d94ad417558102a0e5fc14f81035bae591a
-
Size
1.3MB
-
MD5
74a3602fa37c13016a6e8ad9bb98903a
-
SHA1
766d97b0c9b24f227bb3038e6f1a1d3ef1d0459e
-
SHA256
239ac412c988bd7a5256588042ea1d94ad417558102a0e5fc14f81035bae591a
-
SHA512
18d1ed4d2349e65506ee0582a2e7ccbd1eb7e63ed1392141d0dc8ddbecb7c319b3f9cddb2268a606d9819f8aaa5b4a460a4aa36413f380f5ed417e8f91902ac1
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-