General
-
Target
5fc0cbe32c0528964fb606cbcb483960abb80c27480a2b805f8eeb0e1646ac47
-
Size
1.3MB
-
Sample
230202-qagblagd73
-
MD5
bb79862802375e41f2ecd57dd87568b7
-
SHA1
1aac6e7ae67ea7c342b2143c290b943029e3f524
-
SHA256
5fc0cbe32c0528964fb606cbcb483960abb80c27480a2b805f8eeb0e1646ac47
-
SHA512
4d3a56a07d8b227910d8d52938eea4b455173057d2ed4ea99e55887abfecb5e9ae7a6eccf3858c97838dbd9c77ba3d62e434fd463206d7f11b90ce4b6b695b94
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
5fc0cbe32c0528964fb606cbcb483960abb80c27480a2b805f8eeb0e1646ac47.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
5fc0cbe32c0528964fb606cbcb483960abb80c27480a2b805f8eeb0e1646ac47
-
Size
1.3MB
-
MD5
bb79862802375e41f2ecd57dd87568b7
-
SHA1
1aac6e7ae67ea7c342b2143c290b943029e3f524
-
SHA256
5fc0cbe32c0528964fb606cbcb483960abb80c27480a2b805f8eeb0e1646ac47
-
SHA512
4d3a56a07d8b227910d8d52938eea4b455173057d2ed4ea99e55887abfecb5e9ae7a6eccf3858c97838dbd9c77ba3d62e434fd463206d7f11b90ce4b6b695b94
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-