General
-
Target
9dc2e6c259edb123e3c160cccc98c3aedb976dc42fb36964c5a1433cca80d277
-
Size
1.3MB
-
Sample
230202-rwkftafb59
-
MD5
d0424f2bf591f6bb245e9ac9a4a8f08c
-
SHA1
22df67d2c81245412cf77133227bff593674a12d
-
SHA256
9dc2e6c259edb123e3c160cccc98c3aedb976dc42fb36964c5a1433cca80d277
-
SHA512
e22362304ba9067daad3cd1da3f661c5ad61c494d2bf2dae0dfef8b26174d256e5e9dcedb4cd85f862b3588b0a250276b030f90a4aa7428fc6c3f5c7f3e3fb8b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
9dc2e6c259edb123e3c160cccc98c3aedb976dc42fb36964c5a1433cca80d277.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
9dc2e6c259edb123e3c160cccc98c3aedb976dc42fb36964c5a1433cca80d277
-
Size
1.3MB
-
MD5
d0424f2bf591f6bb245e9ac9a4a8f08c
-
SHA1
22df67d2c81245412cf77133227bff593674a12d
-
SHA256
9dc2e6c259edb123e3c160cccc98c3aedb976dc42fb36964c5a1433cca80d277
-
SHA512
e22362304ba9067daad3cd1da3f661c5ad61c494d2bf2dae0dfef8b26174d256e5e9dcedb4cd85f862b3588b0a250276b030f90a4aa7428fc6c3f5c7f3e3fb8b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-