General
-
Target
ad86287ff527d7240a382d5dfa29bc485708f2ee115f9124f161cf7f0e9ab10a
-
Size
1.3MB
-
Sample
230202-1ne1ssbd6z
-
MD5
7e8b82f5bd1d208891d9e4396fd52b49
-
SHA1
ca084cc838c13b3125fe6320cad6aceef1505181
-
SHA256
ad86287ff527d7240a382d5dfa29bc485708f2ee115f9124f161cf7f0e9ab10a
-
SHA512
fe8e9fb2b2cfbef54b3cc21e3ad1c286db545444d9dbafd2a664673ac8ebe76ee432bee3bd507abfd218dc08924e87be379eb49d94d0ac8c76585e4d68d36f0c
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
ad86287ff527d7240a382d5dfa29bc485708f2ee115f9124f161cf7f0e9ab10a.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
ad86287ff527d7240a382d5dfa29bc485708f2ee115f9124f161cf7f0e9ab10a
-
Size
1.3MB
-
MD5
7e8b82f5bd1d208891d9e4396fd52b49
-
SHA1
ca084cc838c13b3125fe6320cad6aceef1505181
-
SHA256
ad86287ff527d7240a382d5dfa29bc485708f2ee115f9124f161cf7f0e9ab10a
-
SHA512
fe8e9fb2b2cfbef54b3cc21e3ad1c286db545444d9dbafd2a664673ac8ebe76ee432bee3bd507abfd218dc08924e87be379eb49d94d0ac8c76585e4d68d36f0c
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-