General
-
Target
ee63063823a35fc0192deede9bfa0c22cfa83d9c9629d628f3fa1b78a8a593db
-
Size
1.3MB
-
Sample
230202-n7c94aaa8y
-
MD5
fbcb947003cfe9b70d2dd20968c3902b
-
SHA1
2f662c547f001dc47c63bfedefdd2f69ed382dfb
-
SHA256
ee63063823a35fc0192deede9bfa0c22cfa83d9c9629d628f3fa1b78a8a593db
-
SHA512
bcafab20332250e9b9b087f16ec3cb4232141128dc49ae60354769398475cd0aa2d3a7b95822366c0ec39f83044498165ec5ae59e4791dfcc7ca0824a6b0c116
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
ee63063823a35fc0192deede9bfa0c22cfa83d9c9629d628f3fa1b78a8a593db.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
ee63063823a35fc0192deede9bfa0c22cfa83d9c9629d628f3fa1b78a8a593db
-
Size
1.3MB
-
MD5
fbcb947003cfe9b70d2dd20968c3902b
-
SHA1
2f662c547f001dc47c63bfedefdd2f69ed382dfb
-
SHA256
ee63063823a35fc0192deede9bfa0c22cfa83d9c9629d628f3fa1b78a8a593db
-
SHA512
bcafab20332250e9b9b087f16ec3cb4232141128dc49ae60354769398475cd0aa2d3a7b95822366c0ec39f83044498165ec5ae59e4791dfcc7ca0824a6b0c116
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-