General
-
Target
db40277b445ed5b089b3ed7766fe5b208b2cdb725a26037e3fb48adf7d237791
-
Size
1.3MB
-
Sample
230203-dppv3ade9t
-
MD5
6497f52c2bfb87cbb270ac4fc15952f1
-
SHA1
45fa63192981d6b43a5cdbeb42157b313fdc4ac1
-
SHA256
db40277b445ed5b089b3ed7766fe5b208b2cdb725a26037e3fb48adf7d237791
-
SHA512
8a83df520150f9acbf2a3664478de4d3c6530eca210e1c0ea25a26b0ff0bde4749638935488fe969d5b447e5cc552320dc3c9f78bd73b96831006332c75cda6b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
db40277b445ed5b089b3ed7766fe5b208b2cdb725a26037e3fb48adf7d237791.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
db40277b445ed5b089b3ed7766fe5b208b2cdb725a26037e3fb48adf7d237791
-
Size
1.3MB
-
MD5
6497f52c2bfb87cbb270ac4fc15952f1
-
SHA1
45fa63192981d6b43a5cdbeb42157b313fdc4ac1
-
SHA256
db40277b445ed5b089b3ed7766fe5b208b2cdb725a26037e3fb48adf7d237791
-
SHA512
8a83df520150f9acbf2a3664478de4d3c6530eca210e1c0ea25a26b0ff0bde4749638935488fe969d5b447e5cc552320dc3c9f78bd73b96831006332c75cda6b
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-