General
-
Target
c02207169ab90e98b316f240d24e6dea87d3fae5370de254a60e151c3543367a
-
Size
1.3MB
-
Sample
230202-yjpnbsfa62
-
MD5
c4438027b2b634566037e2b5daa1572c
-
SHA1
b499cce43dfbccfdf861384d9218fd9a8a4f4397
-
SHA256
c02207169ab90e98b316f240d24e6dea87d3fae5370de254a60e151c3543367a
-
SHA512
96e4bb54b34622b309925164b48b9d3e92c9141c52199928bbb3b9d12526feb4c96e92caeb0de5157b1b3726b267f4bf4ff93e737b5eacabad8f85aab159f768
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
c02207169ab90e98b316f240d24e6dea87d3fae5370de254a60e151c3543367a.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
c02207169ab90e98b316f240d24e6dea87d3fae5370de254a60e151c3543367a
-
Size
1.3MB
-
MD5
c4438027b2b634566037e2b5daa1572c
-
SHA1
b499cce43dfbccfdf861384d9218fd9a8a4f4397
-
SHA256
c02207169ab90e98b316f240d24e6dea87d3fae5370de254a60e151c3543367a
-
SHA512
96e4bb54b34622b309925164b48b9d3e92c9141c52199928bbb3b9d12526feb4c96e92caeb0de5157b1b3726b267f4bf4ff93e737b5eacabad8f85aab159f768
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-