General
-
Target
7382e53ab73191874d857e20d91b597148eec69e5825196e4e7b296db02d6042
-
Size
1.3MB
-
Sample
230203-a2mppacf4s
-
MD5
7ed96a76ca67210719cb05b24b3f7de6
-
SHA1
83af65839c930622e4d20b3d7a98d8ee1a0ef8c5
-
SHA256
7382e53ab73191874d857e20d91b597148eec69e5825196e4e7b296db02d6042
-
SHA512
2137fb59411b9f1c0fda4a5a6154012e35eeb37e52d645117cc725b2c0d5e221006a601c92d628be2f1e93d1b4573f3a57b1ccb0703df6bc28a86c7e821adaf3
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
7382e53ab73191874d857e20d91b597148eec69e5825196e4e7b296db02d6042.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
7382e53ab73191874d857e20d91b597148eec69e5825196e4e7b296db02d6042
-
Size
1.3MB
-
MD5
7ed96a76ca67210719cb05b24b3f7de6
-
SHA1
83af65839c930622e4d20b3d7a98d8ee1a0ef8c5
-
SHA256
7382e53ab73191874d857e20d91b597148eec69e5825196e4e7b296db02d6042
-
SHA512
2137fb59411b9f1c0fda4a5a6154012e35eeb37e52d645117cc725b2c0d5e221006a601c92d628be2f1e93d1b4573f3a57b1ccb0703df6bc28a86c7e821adaf3
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-