General
-
Target
81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f
-
Size
1.3MB
-
Sample
230203-dp5xaaac72
-
MD5
f206092cfca74c5216dacd3b2c45c935
-
SHA1
275ad5f65bc3d91ad9d41df35b1b34116175ffd8
-
SHA256
81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f
-
SHA512
df13f3437e2c84851ad97e6c6ffeab4bc92f3fdceeab4bde7e8c1ac58f58c37c97ca5d2bb647142c5f8a3e4e9be8bad4827b0822c0acef3055eac0b762183ff2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f
-
Size
1.3MB
-
MD5
f206092cfca74c5216dacd3b2c45c935
-
SHA1
275ad5f65bc3d91ad9d41df35b1b34116175ffd8
-
SHA256
81103d31a672203eac4af47e1026e2f3656580348034e6d34569072d5f81ac8f
-
SHA512
df13f3437e2c84851ad97e6c6ffeab4bc92f3fdceeab4bde7e8c1ac58f58c37c97ca5d2bb647142c5f8a3e4e9be8bad4827b0822c0acef3055eac0b762183ff2
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-