General
-
Target
b78b9e80088687ac515e40f293ef8a3a3eaccb36b58c3c79afc170b00fd3d31d
-
Size
1.3MB
-
Sample
230202-vghv8aah58
-
MD5
0ca290e31ad46426c4a54ea1e7de9cdf
-
SHA1
b4ad96a7106649c899d1c2e48bf94aad781d139e
-
SHA256
b78b9e80088687ac515e40f293ef8a3a3eaccb36b58c3c79afc170b00fd3d31d
-
SHA512
5db49937181da09527fe070bc44a571608086595fc7c6a8d430fbd66ecd4c281d7d766a816ebd74cc4d0c7afce0b195c921f5d8bcbe13f8086de40ba69712f0f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
b78b9e80088687ac515e40f293ef8a3a3eaccb36b58c3c79afc170b00fd3d31d.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
b78b9e80088687ac515e40f293ef8a3a3eaccb36b58c3c79afc170b00fd3d31d
-
Size
1.3MB
-
MD5
0ca290e31ad46426c4a54ea1e7de9cdf
-
SHA1
b4ad96a7106649c899d1c2e48bf94aad781d139e
-
SHA256
b78b9e80088687ac515e40f293ef8a3a3eaccb36b58c3c79afc170b00fd3d31d
-
SHA512
5db49937181da09527fe070bc44a571608086595fc7c6a8d430fbd66ecd4c281d7d766a816ebd74cc4d0c7afce0b195c921f5d8bcbe13f8086de40ba69712f0f
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-