General
-
Target
37ec4f5205c012d27a8c4891f645a2417709a759ff1672e70cf3525c979daa97
-
Size
1.3MB
-
Sample
230203-dvwkssdf4y
-
MD5
c4cab68fb8aae311b884ab90f9ca7e52
-
SHA1
59613af0e6dd11bc41c42fb8660e5ef8528a897a
-
SHA256
37ec4f5205c012d27a8c4891f645a2417709a759ff1672e70cf3525c979daa97
-
SHA512
0c0280bf5856b076944750c55f8c225b5592380d31d4166df5a7ae75cc6717c4f9c3fcc8f901681e2f331ff2cdee2fa80342cebbe7ae3bc2c86a33d922484dac
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
37ec4f5205c012d27a8c4891f645a2417709a759ff1672e70cf3525c979daa97.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
37ec4f5205c012d27a8c4891f645a2417709a759ff1672e70cf3525c979daa97
-
Size
1.3MB
-
MD5
c4cab68fb8aae311b884ab90f9ca7e52
-
SHA1
59613af0e6dd11bc41c42fb8660e5ef8528a897a
-
SHA256
37ec4f5205c012d27a8c4891f645a2417709a759ff1672e70cf3525c979daa97
-
SHA512
0c0280bf5856b076944750c55f8c225b5592380d31d4166df5a7ae75cc6717c4f9c3fcc8f901681e2f331ff2cdee2fa80342cebbe7ae3bc2c86a33d922484dac
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-