General
-
Target
a72c46ae34743ab54d2d1c3926fe83a42c3da5608e56da0be535630b4fff2f4b
-
Size
1.3MB
-
Sample
230202-w6mq5sfa7t
-
MD5
9b075cb44d8bf891ee0e9bac2848aa48
-
SHA1
1146b0861ffc052ad0f244c76e49d710be73e1cf
-
SHA256
a72c46ae34743ab54d2d1c3926fe83a42c3da5608e56da0be535630b4fff2f4b
-
SHA512
6e1fda502902efc77787ee5a0d8fd72145183f179b986ce02c50d701c1fe9271ff71908ab4621138ea4e578074ca6222127c365408ed6c91575448b296750662
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
a72c46ae34743ab54d2d1c3926fe83a42c3da5608e56da0be535630b4fff2f4b.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
a72c46ae34743ab54d2d1c3926fe83a42c3da5608e56da0be535630b4fff2f4b
-
Size
1.3MB
-
MD5
9b075cb44d8bf891ee0e9bac2848aa48
-
SHA1
1146b0861ffc052ad0f244c76e49d710be73e1cf
-
SHA256
a72c46ae34743ab54d2d1c3926fe83a42c3da5608e56da0be535630b4fff2f4b
-
SHA512
6e1fda502902efc77787ee5a0d8fd72145183f179b986ce02c50d701c1fe9271ff71908ab4621138ea4e578074ca6222127c365408ed6c91575448b296750662
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-