General
-
Target
36cfe5df0328e283710c2e51e903746c4734688eb6614b10ec213a05144d79e3
-
Size
1.3MB
-
Sample
230202-vh4t3sed7z
-
MD5
cf9e4bc4fcbfd704c91295a1630d3605
-
SHA1
61e97e6060d176ed1ac61d54405bc4d00912dfcb
-
SHA256
36cfe5df0328e283710c2e51e903746c4734688eb6614b10ec213a05144d79e3
-
SHA512
1bf6ed8e501158fb00fef235300e679596504252c3a74015592e95d012a2ba1be222cf5d58dd349aa880d8935a8d088426898c16ee479b704ffe5debfb05e210
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
36cfe5df0328e283710c2e51e903746c4734688eb6614b10ec213a05144d79e3.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
36cfe5df0328e283710c2e51e903746c4734688eb6614b10ec213a05144d79e3
-
Size
1.3MB
-
MD5
cf9e4bc4fcbfd704c91295a1630d3605
-
SHA1
61e97e6060d176ed1ac61d54405bc4d00912dfcb
-
SHA256
36cfe5df0328e283710c2e51e903746c4734688eb6614b10ec213a05144d79e3
-
SHA512
1bf6ed8e501158fb00fef235300e679596504252c3a74015592e95d012a2ba1be222cf5d58dd349aa880d8935a8d088426898c16ee479b704ffe5debfb05e210
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-