General
-
Target
4233d7b8bc5b1af8c5dc0807d05378a9f1f3ac6b5810c2128705e58ce2dcbd38
-
Size
1.3MB
-
Sample
230202-r54aaagf55
-
MD5
9513f9fa5a9f4b1358abfa403a1b37a7
-
SHA1
0677e59469610f0e1d9fb4f55aefed4a1303b6c6
-
SHA256
4233d7b8bc5b1af8c5dc0807d05378a9f1f3ac6b5810c2128705e58ce2dcbd38
-
SHA512
818fe95b381cecc46fa81df150c38b8102a27657e177d170aa1f1e4c326d663bf403fe0cd81f5ba2e2277cfc67e7317d46bd4bd3ee674ff21d32efc061b08145
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
4233d7b8bc5b1af8c5dc0807d05378a9f1f3ac6b5810c2128705e58ce2dcbd38.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
4233d7b8bc5b1af8c5dc0807d05378a9f1f3ac6b5810c2128705e58ce2dcbd38
-
Size
1.3MB
-
MD5
9513f9fa5a9f4b1358abfa403a1b37a7
-
SHA1
0677e59469610f0e1d9fb4f55aefed4a1303b6c6
-
SHA256
4233d7b8bc5b1af8c5dc0807d05378a9f1f3ac6b5810c2128705e58ce2dcbd38
-
SHA512
818fe95b381cecc46fa81df150c38b8102a27657e177d170aa1f1e4c326d663bf403fe0cd81f5ba2e2277cfc67e7317d46bd4bd3ee674ff21d32efc061b08145
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-