General
-
Target
abc313e92ff329b96b2735bcc18e1795a5093792a0abded91b9fab478dc81ee1
-
Size
1.3MB
-
Sample
230202-qccq7agd82
-
MD5
c675e476b7698ab8798a9e5c7c04ab5d
-
SHA1
3fbd33395848cc15f3407c8985450411a340087d
-
SHA256
abc313e92ff329b96b2735bcc18e1795a5093792a0abded91b9fab478dc81ee1
-
SHA512
c952c76a98cff927ebda3d070ee2a1e372e8094725b083089207418e81c7a24e96a5a1e5b5b63049fd5d88c42f6c76c862f7d35ee848d691fa33caf58c0defab
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
abc313e92ff329b96b2735bcc18e1795a5093792a0abded91b9fab478dc81ee1.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
abc313e92ff329b96b2735bcc18e1795a5093792a0abded91b9fab478dc81ee1
-
Size
1.3MB
-
MD5
c675e476b7698ab8798a9e5c7c04ab5d
-
SHA1
3fbd33395848cc15f3407c8985450411a340087d
-
SHA256
abc313e92ff329b96b2735bcc18e1795a5093792a0abded91b9fab478dc81ee1
-
SHA512
c952c76a98cff927ebda3d070ee2a1e372e8094725b083089207418e81c7a24e96a5a1e5b5b63049fd5d88c42f6c76c862f7d35ee848d691fa33caf58c0defab
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-