General
-
Target
328402d59df6878e1574177313fb55985e211b9f07a41650ce8c8c935f356bed
-
Size
1.3MB
-
Sample
230203-djr38sde5x
-
MD5
e31a849d38871988e529d25f15331266
-
SHA1
2ea013bd7b431986fb0b20d02d93a7851612246a
-
SHA256
328402d59df6878e1574177313fb55985e211b9f07a41650ce8c8c935f356bed
-
SHA512
ce075ce15ce42b5fff31c31964cc03dfee770fcc8002ad24d604411027de9be73926afbcd4e06d3d069c695b17e01680bcffffc5a92b959f1dfb823229801244
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
328402d59df6878e1574177313fb55985e211b9f07a41650ce8c8c935f356bed.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
328402d59df6878e1574177313fb55985e211b9f07a41650ce8c8c935f356bed
-
Size
1.3MB
-
MD5
e31a849d38871988e529d25f15331266
-
SHA1
2ea013bd7b431986fb0b20d02d93a7851612246a
-
SHA256
328402d59df6878e1574177313fb55985e211b9f07a41650ce8c8c935f356bed
-
SHA512
ce075ce15ce42b5fff31c31964cc03dfee770fcc8002ad24d604411027de9be73926afbcd4e06d3d069c695b17e01680bcffffc5a92b959f1dfb823229801244
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-