General
-
Target
8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915
-
Size
1.3MB
-
Sample
230202-1jkeqagb28
-
MD5
66fa4e368bff9805b15a0596727f9bed
-
SHA1
d61ac1e1deccf7d8f9105dffbe8b44515c825eab
-
SHA256
8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915
-
SHA512
0db3b99e5f8d69f6e38756b4ca75c18a6233b7ae36aebb7ab476177bf589767811476e0452ff1effbefe21ef7fe6d066278b3c3417509856f56024620547d582
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915
-
Size
1.3MB
-
MD5
66fa4e368bff9805b15a0596727f9bed
-
SHA1
d61ac1e1deccf7d8f9105dffbe8b44515c825eab
-
SHA256
8adf5898e411763f3321e52c433463c92a9a80273092d96e667018b23c9c7915
-
SHA512
0db3b99e5f8d69f6e38756b4ca75c18a6233b7ae36aebb7ab476177bf589767811476e0452ff1effbefe21ef7fe6d066278b3c3417509856f56024620547d582
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-