General
-
Target
7c9a36a5b6991919c3101de192839d92c6900925af2b30c27061deb58fde0209
-
Size
1.3MB
-
Sample
230202-prh13sgc36
-
MD5
dad24c9190012740e16e4598fbf77f8a
-
SHA1
2655cf20471cfaa7554d70e44fbf6e8474450cdf
-
SHA256
7c9a36a5b6991919c3101de192839d92c6900925af2b30c27061deb58fde0209
-
SHA512
6ea0421638ffe43febb416517c4d98f82bafb85484e7bcdfd56a4569aee70c12a96d2017d67a9cb53393b7c2b2c0fbd91ee4b0922938849049865bde7912d27f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
7c9a36a5b6991919c3101de192839d92c6900925af2b30c27061deb58fde0209.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
7c9a36a5b6991919c3101de192839d92c6900925af2b30c27061deb58fde0209
-
Size
1.3MB
-
MD5
dad24c9190012740e16e4598fbf77f8a
-
SHA1
2655cf20471cfaa7554d70e44fbf6e8474450cdf
-
SHA256
7c9a36a5b6991919c3101de192839d92c6900925af2b30c27061deb58fde0209
-
SHA512
6ea0421638ffe43febb416517c4d98f82bafb85484e7bcdfd56a4569aee70c12a96d2017d67a9cb53393b7c2b2c0fbd91ee4b0922938849049865bde7912d27f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-