General
-
Target
f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce
-
Size
1.3MB
-
Sample
230202-3mls3aha27
-
MD5
e2bc4b8000e0fe4b6f096669c4b8034b
-
SHA1
bcaeafcd6723d224ffa3fc505c1d1451989ecdc1
-
SHA256
f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce
-
SHA512
0180b330254c9277a1a868444318486090d8495d757e96725eda282d6c485cbb596bea42ffdfa6850e0491cc73af6d8b2d32c4f819589bb59ea7de62de45bc73
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce
-
Size
1.3MB
-
MD5
e2bc4b8000e0fe4b6f096669c4b8034b
-
SHA1
bcaeafcd6723d224ffa3fc505c1d1451989ecdc1
-
SHA256
f5af7ff91d40188c31df0380f2579e675c79859b5306dd4556658d155dffffce
-
SHA512
0180b330254c9277a1a868444318486090d8495d757e96725eda282d6c485cbb596bea42ffdfa6850e0491cc73af6d8b2d32c4f819589bb59ea7de62de45bc73
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-