General
-
Target
e1d71999b1c416446142a202546e33e1575e50dab8a2c6b882905ca1dd334919
-
Size
1.3MB
-
Sample
230203-b5wbnsda7y
-
MD5
6fab4ce991a8618e77b822eca4de2dd4
-
SHA1
2e059fcddbfb743cd6889523914835ca50d0e0b0
-
SHA256
e1d71999b1c416446142a202546e33e1575e50dab8a2c6b882905ca1dd334919
-
SHA512
21547f5800fc961f9c66c938b49b741b1c2d2750fd8a63ad6f424d1e4894a1db288ecf235641c2ceddc52f09b9c625e5673266fafc68188706d5e4f233eff0a6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
e1d71999b1c416446142a202546e33e1575e50dab8a2c6b882905ca1dd334919.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
e1d71999b1c416446142a202546e33e1575e50dab8a2c6b882905ca1dd334919
-
Size
1.3MB
-
MD5
6fab4ce991a8618e77b822eca4de2dd4
-
SHA1
2e059fcddbfb743cd6889523914835ca50d0e0b0
-
SHA256
e1d71999b1c416446142a202546e33e1575e50dab8a2c6b882905ca1dd334919
-
SHA512
21547f5800fc961f9c66c938b49b741b1c2d2750fd8a63ad6f424d1e4894a1db288ecf235641c2ceddc52f09b9c625e5673266fafc68188706d5e4f233eff0a6
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-