General
-
Target
086304cba4c7d7bd8e430e9f712b89ce7ebcda08ad184995bde9a23aa7f1888f
-
Size
1.3MB
-
Sample
230202-pf446sab5z
-
MD5
c90bd2286c6507426561fc9268cc5b49
-
SHA1
f680ce78dc37b4de1a3d5b9d0b0ed3a8f7c05db2
-
SHA256
086304cba4c7d7bd8e430e9f712b89ce7ebcda08ad184995bde9a23aa7f1888f
-
SHA512
df6d00295cddec9da971de3b6df387973fbc2b36b36a13ac5695e681aaad30a0b4cf92676ac5d396e43e6f175e40d9bc0cfec37ec5313517a1e0380561e52915
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
086304cba4c7d7bd8e430e9f712b89ce7ebcda08ad184995bde9a23aa7f1888f.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
086304cba4c7d7bd8e430e9f712b89ce7ebcda08ad184995bde9a23aa7f1888f
-
Size
1.3MB
-
MD5
c90bd2286c6507426561fc9268cc5b49
-
SHA1
f680ce78dc37b4de1a3d5b9d0b0ed3a8f7c05db2
-
SHA256
086304cba4c7d7bd8e430e9f712b89ce7ebcda08ad184995bde9a23aa7f1888f
-
SHA512
df6d00295cddec9da971de3b6df387973fbc2b36b36a13ac5695e681aaad30a0b4cf92676ac5d396e43e6f175e40d9bc0cfec37ec5313517a1e0380561e52915
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-