General
-
Target
c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206
-
Size
1.3MB
-
Sample
230203-f4sllsef3y
-
MD5
6435661990523418ffa1d4861ac7fc14
-
SHA1
fbc38ecb7c6be72d72a095dc0d8d9948ae2562e1
-
SHA256
c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206
-
SHA512
ce53072d5b083b8b16653e875e700ced34960bcc4e92536a346ee9d32bda7e22f64256666034bc9088cb3e9ea2329570e8dff53324941098e4be1fb00e67bbff
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206
-
Size
1.3MB
-
MD5
6435661990523418ffa1d4861ac7fc14
-
SHA1
fbc38ecb7c6be72d72a095dc0d8d9948ae2562e1
-
SHA256
c83fd02f8c961df5f6b21c3cd9584196b630f55f8e195502a14ba06897c58206
-
SHA512
ce53072d5b083b8b16653e875e700ced34960bcc4e92536a346ee9d32bda7e22f64256666034bc9088cb3e9ea2329570e8dff53324941098e4be1fb00e67bbff
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-