General
-
Target
a6fd2d1d38d08920666968d703f655ed908b4f3a1da36d33a0965eeea0d3aa3c
-
Size
1.3MB
-
Sample
230202-pqy1xaac2z
-
MD5
d55189c2025bb56e7c1533b3a9a9fb7c
-
SHA1
99d7581b2e66d5bb8d824efccd63c2f54c4d8c8a
-
SHA256
a6fd2d1d38d08920666968d703f655ed908b4f3a1da36d33a0965eeea0d3aa3c
-
SHA512
49f566ac3e047f5a4bb3243e2deba339fbd2b3d106fc3f5c4f30495c3ff6658568f2e7c54c67da2f654dff5e4817976b82ea68c8f5eead5b3255a81070aa829b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
a6fd2d1d38d08920666968d703f655ed908b4f3a1da36d33a0965eeea0d3aa3c.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
a6fd2d1d38d08920666968d703f655ed908b4f3a1da36d33a0965eeea0d3aa3c
-
Size
1.3MB
-
MD5
d55189c2025bb56e7c1533b3a9a9fb7c
-
SHA1
99d7581b2e66d5bb8d824efccd63c2f54c4d8c8a
-
SHA256
a6fd2d1d38d08920666968d703f655ed908b4f3a1da36d33a0965eeea0d3aa3c
-
SHA512
49f566ac3e047f5a4bb3243e2deba339fbd2b3d106fc3f5c4f30495c3ff6658568f2e7c54c67da2f654dff5e4817976b82ea68c8f5eead5b3255a81070aa829b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-