General
-
Target
8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540
-
Size
1.3MB
-
Sample
230202-x646vsaa4y
-
MD5
9e3d19ebba6356efb4c1858a8a86090d
-
SHA1
b4082ef25a68a18b814d62ec81f0d431158c8611
-
SHA256
8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540
-
SHA512
055e144103b7205821e4a4763a29628f9517ff9010e7c492ec2cf4bf81658ddf1d53f03a4ed97803c02c4a783f3f24e62353f891b949401257d532909e863f56
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540
-
Size
1.3MB
-
MD5
9e3d19ebba6356efb4c1858a8a86090d
-
SHA1
b4082ef25a68a18b814d62ec81f0d431158c8611
-
SHA256
8beebff0c896bca3753f207338bd093b3edd6a2c6f77bfb6ef7ddfb0f8f87540
-
SHA512
055e144103b7205821e4a4763a29628f9517ff9010e7c492ec2cf4bf81658ddf1d53f03a4ed97803c02c4a783f3f24e62353f891b949401257d532909e863f56
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-