General
-
Target
eed9f304a81b4cf80cad4575920927d0ad6facbf5ae1640184b58120294731b1
-
Size
1.3MB
-
Sample
230202-yw8a7sfc23
-
MD5
72dcca2d070011b94510de26c4bbe745
-
SHA1
d8f35000717453fcc3583ba9c60badea199abe52
-
SHA256
eed9f304a81b4cf80cad4575920927d0ad6facbf5ae1640184b58120294731b1
-
SHA512
73cc01d5fda769aa7e089c36c42340cb8ce78f9696ed83deca279b5946d0db37d2ea5914eee33a2db3764d83a28612d91e19e4ad15ed9d53b726602f4595a4bb
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
eed9f304a81b4cf80cad4575920927d0ad6facbf5ae1640184b58120294731b1.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
eed9f304a81b4cf80cad4575920927d0ad6facbf5ae1640184b58120294731b1
-
Size
1.3MB
-
MD5
72dcca2d070011b94510de26c4bbe745
-
SHA1
d8f35000717453fcc3583ba9c60badea199abe52
-
SHA256
eed9f304a81b4cf80cad4575920927d0ad6facbf5ae1640184b58120294731b1
-
SHA512
73cc01d5fda769aa7e089c36c42340cb8ce78f9696ed83deca279b5946d0db37d2ea5914eee33a2db3764d83a28612d91e19e4ad15ed9d53b726602f4595a4bb
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-