General
-
Target
3376f3cbd3a3ef9d63a14180450a545b15c8902b754e95ad286c03b6ccc8e90c
-
Size
1.3MB
-
Sample
230202-261wnagg83
-
MD5
688116f1624756162afdf674c5772cba
-
SHA1
d4377e18b0a53ebbde981d8fa60d79086a2d9367
-
SHA256
3376f3cbd3a3ef9d63a14180450a545b15c8902b754e95ad286c03b6ccc8e90c
-
SHA512
2348b49235eef1fe57788a31ce2474134d814033df0d6b7c5c1b5d4ad61350c10ea2d28023bbadf2a6186aa25c67f51d084b95d606836755c2330905daaa1897
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
3376f3cbd3a3ef9d63a14180450a545b15c8902b754e95ad286c03b6ccc8e90c.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
3376f3cbd3a3ef9d63a14180450a545b15c8902b754e95ad286c03b6ccc8e90c
-
Size
1.3MB
-
MD5
688116f1624756162afdf674c5772cba
-
SHA1
d4377e18b0a53ebbde981d8fa60d79086a2d9367
-
SHA256
3376f3cbd3a3ef9d63a14180450a545b15c8902b754e95ad286c03b6ccc8e90c
-
SHA512
2348b49235eef1fe57788a31ce2474134d814033df0d6b7c5c1b5d4ad61350c10ea2d28023bbadf2a6186aa25c67f51d084b95d606836755c2330905daaa1897
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-