General
-
Target
452a4a7ec9397cdd92d5f0d7d033d6600967e408085d1587566e80dcea9f2099
-
Size
1.3MB
-
Sample
230203-jys7qsch89
-
MD5
dc11ec12721e2e6f74756c65c06037be
-
SHA1
e2890974f40c8d61882edba0509e8392394f4061
-
SHA256
452a4a7ec9397cdd92d5f0d7d033d6600967e408085d1587566e80dcea9f2099
-
SHA512
63f6d4271fbab8ef904b8107ee82a64ab189097c1294d0cf82c6b52eac97766e6d5a6cf4f63854980ef452e9677bde05ef78e0e23ba80389cb327eff9cd1f772
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
452a4a7ec9397cdd92d5f0d7d033d6600967e408085d1587566e80dcea9f2099.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
452a4a7ec9397cdd92d5f0d7d033d6600967e408085d1587566e80dcea9f2099
-
Size
1.3MB
-
MD5
dc11ec12721e2e6f74756c65c06037be
-
SHA1
e2890974f40c8d61882edba0509e8392394f4061
-
SHA256
452a4a7ec9397cdd92d5f0d7d033d6600967e408085d1587566e80dcea9f2099
-
SHA512
63f6d4271fbab8ef904b8107ee82a64ab189097c1294d0cf82c6b52eac97766e6d5a6cf4f63854980ef452e9677bde05ef78e0e23ba80389cb327eff9cd1f772
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-