General
-
Target
5ebe0d2a40be68f8b39edd5acee6a5e3797d570f0c69f779b84b2c85c45368ab
-
Size
1.3MB
-
Sample
230203-dsvwgsac94
-
MD5
55cea65fa61e04ac797469895b87fb0e
-
SHA1
e4765f58351bdb36aa15a818ac83f14cda79453b
-
SHA256
5ebe0d2a40be68f8b39edd5acee6a5e3797d570f0c69f779b84b2c85c45368ab
-
SHA512
52aafcf439c57bf8d83153d2e62ed4c8a4d8f73730c181b2c751a7df204f079cbe114a65cf3337dad551ee53b47835ff14b5e1bc89d5d1f0d5e671a451bd20c3
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
5ebe0d2a40be68f8b39edd5acee6a5e3797d570f0c69f779b84b2c85c45368ab.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
5ebe0d2a40be68f8b39edd5acee6a5e3797d570f0c69f779b84b2c85c45368ab
-
Size
1.3MB
-
MD5
55cea65fa61e04ac797469895b87fb0e
-
SHA1
e4765f58351bdb36aa15a818ac83f14cda79453b
-
SHA256
5ebe0d2a40be68f8b39edd5acee6a5e3797d570f0c69f779b84b2c85c45368ab
-
SHA512
52aafcf439c57bf8d83153d2e62ed4c8a4d8f73730c181b2c751a7df204f079cbe114a65cf3337dad551ee53b47835ff14b5e1bc89d5d1f0d5e671a451bd20c3
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-