General
-
Target
78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199
-
Size
1.3MB
-
Sample
230203-dl8trsac42
-
MD5
4ef031db663c197163f81187ce6a86a7
-
SHA1
f0d7dc4856a99dbc25521e2473a1b0240e5b01e0
-
SHA256
78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199
-
SHA512
ffdf04340164f29dbf4a244dae0fd6f22780ad3538d09a3d55f3ec2593ce60899e58185030391d08779dd0b013b93e909a006858585273a0eb7d2df313a32524
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199
-
Size
1.3MB
-
MD5
4ef031db663c197163f81187ce6a86a7
-
SHA1
f0d7dc4856a99dbc25521e2473a1b0240e5b01e0
-
SHA256
78049f20439d2c5b44b4af28051221cdf6b0447e7abfb0734bda27cdf7c76199
-
SHA512
ffdf04340164f29dbf4a244dae0fd6f22780ad3538d09a3d55f3ec2593ce60899e58185030391d08779dd0b013b93e909a006858585273a0eb7d2df313a32524
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-