General
-
Target
7b91302951360f5643c16360dfcd7884fc162e597e35e3ab07ed7f022a6d5935
-
Size
1.3MB
-
Sample
230202-s5p84aga81
-
MD5
266e80123daf61ae07752be98ef599a9
-
SHA1
7ba10b565f0cc5e0bcdc8fb27b4e4f170b9299c9
-
SHA256
7b91302951360f5643c16360dfcd7884fc162e597e35e3ab07ed7f022a6d5935
-
SHA512
818c60b1bef180e5b24116a589a7cf790c558c180f3d91e194174e76e58586f0a6a545a0a159e9ec21618df4d8f6b2a27dd6df24e73ad142646db267fafdfdcc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
7b91302951360f5643c16360dfcd7884fc162e597e35e3ab07ed7f022a6d5935.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
7b91302951360f5643c16360dfcd7884fc162e597e35e3ab07ed7f022a6d5935
-
Size
1.3MB
-
MD5
266e80123daf61ae07752be98ef599a9
-
SHA1
7ba10b565f0cc5e0bcdc8fb27b4e4f170b9299c9
-
SHA256
7b91302951360f5643c16360dfcd7884fc162e597e35e3ab07ed7f022a6d5935
-
SHA512
818c60b1bef180e5b24116a589a7cf790c558c180f3d91e194174e76e58586f0a6a545a0a159e9ec21618df4d8f6b2a27dd6df24e73ad142646db267fafdfdcc
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-