General
-
Target
1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9
-
Size
1.3MB
-
Sample
230203-lnle9ahc7y
-
MD5
efe75a185387d1c9494673ac47ce3256
-
SHA1
96b596dbb94735a20642b7eb5b28f850d4d5a6f1
-
SHA256
1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9
-
SHA512
cd7ab1b2ecc9bc6c37f50b0dcb429b22dfa91fd9303af109515647007a1d86f5d1f44355518a7c2ba5da5f28099c922d08970676dd1b834dce917af800c7367a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9.exe
Resource
win10-20220812-en
Malware Config
Targets
-
-
Target
1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9
-
Size
1.3MB
-
MD5
efe75a185387d1c9494673ac47ce3256
-
SHA1
96b596dbb94735a20642b7eb5b28f850d4d5a6f1
-
SHA256
1ae261c756573faac0c8b51d1a0741854fff29199d0308791030d23b69e255b9
-
SHA512
cd7ab1b2ecc9bc6c37f50b0dcb429b22dfa91fd9303af109515647007a1d86f5d1f44355518a7c2ba5da5f28099c922d08970676dd1b834dce917af800c7367a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-