General
-
Target
964ce730d428aef774eb686ff0419e15e770c89340a266eb3237edb72fb5391e
-
Size
1.3MB
-
Sample
230202-y8lyqsae7z
-
MD5
d7a91c4af5c2771fdbbd4b28ae58bd25
-
SHA1
31f23078e712650e48753df3653964b8b2989505
-
SHA256
964ce730d428aef774eb686ff0419e15e770c89340a266eb3237edb72fb5391e
-
SHA512
7d332f5dd7d831d89de97a7549448b90eb8541088791d4630f18c575f06f5624aabf4b5d39bde14e2677a61aebf9da580b282cc737308ae008ce551963ef5d32
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
964ce730d428aef774eb686ff0419e15e770c89340a266eb3237edb72fb5391e.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
964ce730d428aef774eb686ff0419e15e770c89340a266eb3237edb72fb5391e
-
Size
1.3MB
-
MD5
d7a91c4af5c2771fdbbd4b28ae58bd25
-
SHA1
31f23078e712650e48753df3653964b8b2989505
-
SHA256
964ce730d428aef774eb686ff0419e15e770c89340a266eb3237edb72fb5391e
-
SHA512
7d332f5dd7d831d89de97a7549448b90eb8541088791d4630f18c575f06f5624aabf4b5d39bde14e2677a61aebf9da580b282cc737308ae008ce551963ef5d32
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-