General
-
Target
448891daf1da1c4d517f86ee6a4028656161a1ced13a5db3e379ff9cbdfbb817
-
Size
1.3MB
-
Sample
230203-kc1v5age7z
-
MD5
1a5954431164c6c4bda35b25f9b4959d
-
SHA1
746b128e5e3d9bcdf90441b72aea0ded497ba319
-
SHA256
448891daf1da1c4d517f86ee6a4028656161a1ced13a5db3e379ff9cbdfbb817
-
SHA512
e393a089922f2fd81b8610159dbb95d5dcb5e2e8e39086ac9843ec11b249b967528e21646e627df4b1987bf94da4a98e014d411691cc6980670cd727e69cde29
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
448891daf1da1c4d517f86ee6a4028656161a1ced13a5db3e379ff9cbdfbb817.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
448891daf1da1c4d517f86ee6a4028656161a1ced13a5db3e379ff9cbdfbb817
-
Size
1.3MB
-
MD5
1a5954431164c6c4bda35b25f9b4959d
-
SHA1
746b128e5e3d9bcdf90441b72aea0ded497ba319
-
SHA256
448891daf1da1c4d517f86ee6a4028656161a1ced13a5db3e379ff9cbdfbb817
-
SHA512
e393a089922f2fd81b8610159dbb95d5dcb5e2e8e39086ac9843ec11b249b967528e21646e627df4b1987bf94da4a98e014d411691cc6980670cd727e69cde29
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-