General
-
Target
1b40655bd0bcb99ccc658156accf448a15e35c19e20b8481adf96eeae6870ddb
-
Size
1.3MB
-
Sample
230203-arrwnahc39
-
MD5
0ae23448e2637632c1292abba3a826f2
-
SHA1
e2946194bb4905118bdea828e7756b9a3f94d64f
-
SHA256
1b40655bd0bcb99ccc658156accf448a15e35c19e20b8481adf96eeae6870ddb
-
SHA512
9a88523bee2fd8f0cef2bf313812b5840a9a19f607ac44dfbab9a77c0c54e4b2a224ff65ab8a225669ccd49a85143e770e7a46f15f3c064d79b887010608649e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
1b40655bd0bcb99ccc658156accf448a15e35c19e20b8481adf96eeae6870ddb.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
1b40655bd0bcb99ccc658156accf448a15e35c19e20b8481adf96eeae6870ddb
-
Size
1.3MB
-
MD5
0ae23448e2637632c1292abba3a826f2
-
SHA1
e2946194bb4905118bdea828e7756b9a3f94d64f
-
SHA256
1b40655bd0bcb99ccc658156accf448a15e35c19e20b8481adf96eeae6870ddb
-
SHA512
9a88523bee2fd8f0cef2bf313812b5840a9a19f607ac44dfbab9a77c0c54e4b2a224ff65ab8a225669ccd49a85143e770e7a46f15f3c064d79b887010608649e
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-