General
-
Target
d49b39591c4dd59a8f0306e3157788a32258f4bef0b60869f47bbf62fac87ee8
-
Size
1.3MB
-
Sample
230203-bzd57shf82
-
MD5
84905591312d643b26140b972e9a214e
-
SHA1
3e4a9158930e43c18490ad82899b1a253558bda5
-
SHA256
d49b39591c4dd59a8f0306e3157788a32258f4bef0b60869f47bbf62fac87ee8
-
SHA512
f98e04499d697c0824ebdd635673ce903e1175f4caace1c2be95d9db9781e8c73bd0a3fd089101c3d7ebdd454c028b051c9a7384114fe3ac41a18e5a117fb3e5
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
d49b39591c4dd59a8f0306e3157788a32258f4bef0b60869f47bbf62fac87ee8.exe
Resource
win10-20220901-en
Malware Config
Targets
-
-
Target
d49b39591c4dd59a8f0306e3157788a32258f4bef0b60869f47bbf62fac87ee8
-
Size
1.3MB
-
MD5
84905591312d643b26140b972e9a214e
-
SHA1
3e4a9158930e43c18490ad82899b1a253558bda5
-
SHA256
d49b39591c4dd59a8f0306e3157788a32258f4bef0b60869f47bbf62fac87ee8
-
SHA512
f98e04499d697c0824ebdd635673ce903e1175f4caace1c2be95d9db9781e8c73bd0a3fd089101c3d7ebdd454c028b051c9a7384114fe3ac41a18e5a117fb3e5
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-