General
-
Target
30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4
-
Size
1.3MB
-
Sample
230202-wddb1aba4v
-
MD5
e8c0b25506c9903293eb8f07b4cbff27
-
SHA1
f1867544fe032e1233ba1c9034c07ea8a09d288d
-
SHA256
30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4
-
SHA512
ae9c39a01f7f92ba0ac0eae25c1f9875ecbc82c9b690249944d2caef190db35c6f7c6ca872f16037f2e1160bda4d7d2605adf3c8dfd006228a0de77f422c887b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4
-
Size
1.3MB
-
MD5
e8c0b25506c9903293eb8f07b4cbff27
-
SHA1
f1867544fe032e1233ba1c9034c07ea8a09d288d
-
SHA256
30dd9a3ad5b162b0958bbc9122b95088410e3968902bf76dcf0f0e60156377b4
-
SHA512
ae9c39a01f7f92ba0ac0eae25c1f9875ecbc82c9b690249944d2caef190db35c6f7c6ca872f16037f2e1160bda4d7d2605adf3c8dfd006228a0de77f422c887b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-