General
-
Target
90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef
-
Size
1.3MB
-
Sample
230202-vhej7aec8s
-
MD5
fb1d95832c729062efbd85c63670d637
-
SHA1
064b5692e2b08b209aa08975248891814de4c9f5
-
SHA256
90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef
-
SHA512
cf2025467b0bac100e5802fccc3fdb47688db22fedc2e27d9b8c3ce1500e0355c4548d728638feecd08265533a294e42b6f2c50b65cec53497a7be8e1ee40318
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef
-
Size
1.3MB
-
MD5
fb1d95832c729062efbd85c63670d637
-
SHA1
064b5692e2b08b209aa08975248891814de4c9f5
-
SHA256
90437514fe93297ded6a550bcfc41ca7a8e8581a2654f981613b3f220e8f21ef
-
SHA512
cf2025467b0bac100e5802fccc3fdb47688db22fedc2e27d9b8c3ce1500e0355c4548d728638feecd08265533a294e42b6f2c50b65cec53497a7be8e1ee40318
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-